نتایج جستجو برای: e fetida worm and worm biomass

تعداد نتایج: 17343716  

2005
Lunquan Li Soranun Jiwasurat Peng Liu George Kesidis

Worms are a serious threat to Internet security. The past research on worm has been focused on mathematical modeling, numerical analysis, and simulation in addition to proposed defense strategies. We believe a fine-grained, packet-level emulation of worm propagation in enterprise networks is highly beneficial for the deep understanding of worm dynamics and a prerequisite for worm containment an...

2011
Xufei Zheng Tao Li Hua Yang Xin Xiao

Due to the proactive defend against the worm propagation and patch the susceptible hosts, benign worms are attracting wide attentions in the field of worm research. In this paper, we point out the errors of worm-anti-worm model (WAW) and present a revised model named Re-WAW based on the law of worm propagation and Two-Factor model. Based on the discussion of the worm propagation factors such as...

A. Dalimi, Gh.R. Motamedi H. Paykari M. Syavashi M.H. Hablolvarid

Cystic Echinococcosis is an important zoonosis in the sheep rising areas of Iran. To develop a simple and reliable diagnostic method for Echinococcus infection in definitive hosts, E. granulosus polyoclonal antibodies (PolyAbs) were prepared from adult worm in rabbit. A selected PoAb was used for coproantigen detection in faecal samples obtained from animals naturally infected with Echinococcus...

2007
Bo CHEN Xiao-Chun YUN

After many Internet-scale worm incidents in recent years, it is clear that a simple self-propagation worm can quickly spread across the Internet. And every worm incidents can cause severe damage to our society. So it is necessary to build a system that can detect the presence of worm as quickly as possible. This paper first analyzes the worm’s framework and its propagation model. Then, we descr...

Journal: :Simulation 2006
Cliff Changchun Zou Donald F. Towsley Weibo Gong Songlin Cai

Most well-known worms, such as Code Red, Slammer, Blaster, and Sasser, infected vulnerable computers by scanning the entire IPv4 address space. In this article, the authors present an advanced worm called the “routing worm,” which implements two new attacking techniques. First, a routing worm uses Border Gateway Protocol (BGP) routing tables to only scan the Internet-routable address space, whi...

2005
Jangwon Choi Jaewook Lee Jahwan Koo Byungyeon Park Wonhyuk Lee Seongjin Ahn

The effort required for detecting worm viruses, that threaten the reliability and stability of network resources, is in the process of advancing, demanding increasingly sophisticated resources. Pattern-based worm virus detection systems use detection methods, which focus on pattern analysis for specific worm viruses. In the event of a different attack method, or a new attack occurs, current sys...

2012
Ramesh Kumar

| October 2012 | 990 l e t t e r t O e d it O r operator dependency and poor visualization of lower CBD are other limitations of US, for detection of biliary ascariasis. MRCP is very accurate in providing detailed information of the biliary system, without operator‐ dependency. It shows intraductal ascaris as linear hypointense filling defects.[5] However, in this case, the worm remained undete...

Journal: :Environmental pollution 2013
Chui-Fan Zhou Yu-Jun Wang Cheng-Cheng Li Rui-Juan Sun Yuan-Chun Yu Dong-Mei Zhou

Glyphosate (GPS) and copper (Cu) are common pollutants in soils, and commonly co-exist. Due to the chemical structure of GPS, it can form complexes of heavy metals and interface their bioavailability in soil environment. In order to explore the interactions between GPS and Cu, subacute toxicity tests of Cu and GPS on soil invertebrate earthworms (Eisenia fetida) were conducted. The relative wei...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید