نتایج جستجو برای: e fetida worm and worm biomass
تعداد نتایج: 17343716 فیلتر نتایج به سال:
Worms are a serious threat to Internet security. The past research on worm has been focused on mathematical modeling, numerical analysis, and simulation in addition to proposed defense strategies. We believe a fine-grained, packet-level emulation of worm propagation in enterprise networks is highly beneficial for the deep understanding of worm dynamics and a prerequisite for worm containment an...
Due to the proactive defend against the worm propagation and patch the susceptible hosts, benign worms are attracting wide attentions in the field of worm research. In this paper, we point out the errors of worm-anti-worm model (WAW) and present a revised model named Re-WAW based on the law of worm propagation and Two-Factor model. Based on the discussion of the worm propagation factors such as...
Cystic Echinococcosis is an important zoonosis in the sheep rising areas of Iran. To develop a simple and reliable diagnostic method for Echinococcus infection in definitive hosts, E. granulosus polyoclonal antibodies (PolyAbs) were prepared from adult worm in rabbit. A selected PoAb was used for coproantigen detection in faecal samples obtained from animals naturally infected with Echinococcus...
After many Internet-scale worm incidents in recent years, it is clear that a simple self-propagation worm can quickly spread across the Internet. And every worm incidents can cause severe damage to our society. So it is necessary to build a system that can detect the presence of worm as quickly as possible. This paper first analyzes the worm’s framework and its propagation model. Then, we descr...
Most well-known worms, such as Code Red, Slammer, Blaster, and Sasser, infected vulnerable computers by scanning the entire IPv4 address space. In this article, the authors present an advanced worm called the “routing worm,” which implements two new attacking techniques. First, a routing worm uses Border Gateway Protocol (BGP) routing tables to only scan the Internet-routable address space, whi...
The effort required for detecting worm viruses, that threaten the reliability and stability of network resources, is in the process of advancing, demanding increasingly sophisticated resources. Pattern-based worm virus detection systems use detection methods, which focus on pattern analysis for specific worm viruses. In the event of a different attack method, or a new attack occurs, current sys...
| October 2012 | 990 l e t t e r t O e d it O r operator dependency and poor visualization of lower CBD are other limitations of US, for detection of biliary ascariasis. MRCP is very accurate in providing detailed information of the biliary system, without operator‐ dependency. It shows intraductal ascaris as linear hypointense filling defects.[5] However, in this case, the worm remained undete...
Glyphosate (GPS) and copper (Cu) are common pollutants in soils, and commonly co-exist. Due to the chemical structure of GPS, it can form complexes of heavy metals and interface their bioavailability in soil environment. In order to explore the interactions between GPS and Cu, subacute toxicity tests of Cu and GPS on soil invertebrate earthworms (Eisenia fetida) were conducted. The relative wei...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید