نتایج جستجو برای: reared worm

تعداد نتایج: 19996  

2007
Mark Wallis Frans A. Henskens

One of the largest threats to network security in Internet-connected corporate networks is attack via worms. Worms infiltrate the network and compromise security, consuming processor cycles and network bandwidth that would otherwise be available for corporate use. This research analyses a particular strain of network worm called the “Ethical worm”, which is targeted towards beneficial means rat...

Journal: :JCP 2012
Dewu Xu Jianfeng Lu Wei Chen

To improve the efficiency of resistance of anti-worms to malicious worms and enhance their diffusibility, diffusion strategies of anti-worms based on B+ address tree are proposed in order to speed up anti-worm diffusion rate in the network and reduce anti-worm influence on network system when diffused. The diffusion strategies are simulated by scilab. Results show that anti-worms using B+ addre...

Journal: :IJSN 2009
Zesheng Chen Chao Chen Yubin Li

This work presents a closed-form expression for characterizing the spread of a class of worm-scanning strategies through a mean-field approximation. This expression can both accurately capture the worm propagation speed before the number of infections becomes large and explicitly demonstrate the effects of important parameters such as the vulnerable-host distribution and the worm-scanning strat...

Journal: :iranian journal of public health 0
m.bahmanrokh m. mahmoodi

a total of 68385 live pin-worm eggs from adhesive scotch tape were exposed to different detergent powders in under to compare method of detergent washing clothes with the boiling method for the control of family enterobiasis. results show that: a) 80.4-100 percent of eggs are destroyed after hatching within 6-8 hours of exposure to 0.25 gr% detergent at 10-250c. exposure for less than 6 hours h...

2013
M. Milton Joe R. S. Shaji K. Ashok Kumar

Worm is the major hurdle, which restricts the comfortable communication in any networks. Worm is a malicious software program that destroys the normal communication in the networking systems. Every system must not be vulnerable to avoid infection by worm in the computing networks. Defending against such worm still plays vital role to the network programmers. Various countermeasures have been ta...

Journal: :Infant behavior & development 2008
Natasha A Dobrova-Krol Marinus H van Ijzendoorn Marian J Bakermans-Kranenburg Chantal Cyr Femmie Juffer

To study the effect of institutional rearing on physical growth and stress regulation we examined 16 institution-reared children (3-6 years old) in Ukraine and compared them with 18 native family-reared children pair-matched on age and gender. Physical growth trajectories were examined on the basis of archival medical records and current measurements of height, weight, and head circumference. S...

Journal: :Transactions of the Japan Society of Mechanical Engineers 1952

2013
Sun Yunxiao

Welchia worms were launched to terminate the Blaster worms and patch the vulnerable hosts. They created complex worm interactions as well as detrimental impact on infrastructure. Worm propagation analysis, including exploring mechanisms of predator-prey worms’ propagation and formulating effects of network/worm parameters, has great importance for worm containment and host protection. In this p...

Journal: :Developmental Cell 2004

Journal: :Molecular Pain 2005

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید