نتایج جستجو برای: worm

تعداد نتایج: 9462  

2002
Toshiyuki Takeda Daniel D. Suthers

With the expansion of the Internet, system administrators cannot keep up with the new viruses and security vulnerability information. As Code Red and the Nimda Worm spread globally in 2001, the understanding of how to prevent such viruses was not sufficiently disseminated from system administrators to users. Although companies like Microsoft and CERT published security information, many users d...

Journal: :Journal of helminthology 2004
L J Seivwright S M Redpath F Mougeot L Watt P J Hudson

The reliability of different egg counting methods for estimating the intensity of Trichostrongylus tenuis infections in red grouse, Lagopus lagopus scoticus, was investigated in the autumn, when grouse may harbour high parasite intensities. Possible limitations to the use of these methods were also examined. Faecal egg counts were found to accurately estimate T. tenuis worm intensities, at leas...

2003
Zesheng Chen Lixin Gao Kevin A. Kwiat

Active worms spread in an automated fashion and can flood the Internet in a very short time. Modeling the spread of active worms can help us understand how active worms spread, and how we can monitor and defend against the propagation of worms effectively. In this paper, we present a mathematical model, referred to as the Analytical Active Worm Propagation (AAWP) model, which characterizes the ...

Journal: :The Onderstepoort journal of veterinary research 1995
R C Krecek R Hartman H T Groeneveld A Thorne

The influence of microclimate on numbers of third-state larvae of haemonchus contortus and Haemonchus placei in four strata of irrigated Kikuyu pasture was assessed. On 36 different, interspersed days three replicates of pasture samples were collected on three occasions per day from 1990-1992 for larval recovery and the log10 mean counts of the larvae recovered were analysed by use of ANOVA mod...

Journal: :Computer Communications 2008
Wei Yu Sriram Chellappan Xun Wang Dong Xuan

0140-3664/$ see front matter 2008 Elsevier B.V. A doi:10.1016/j.comcom.2008.08.008 * Corresponding author. Tel.: +1 214 208 5951. E-mail addresses: [email protected] (W. Yu), ch pan), [email protected] (X. Wang), xuan@cs Active worms continue to pose major threats to the security of today’s Internet. This is due to the ability of active worms to automatically propagate themselves and co...

2010

Small strongyles (‘small red worm’) are the most common and harmful intestinal worm of horses worldwide and account for 95% of faecal worm egg count burdens. The adult worms are small (1-2 cm long) and live in the horse’s large intestine (Fig. 1). The adult worms lay eggs which pass onto the pasture in the manure. Larvae (immature worm) hatch from the egg and cleverly migrate up blades of grass...

Journal: :journal of artificial intelligence in electrical engineering 2015
mohammad reza sayyed noorani pouya nourfar

in this paper we intend to generate some set of optimal trajectories according to the number of control points has been applied for parameterizing those using b-spline curves. the trajectories are used to generate an optimal locomotion gait in a crawling worm-like robot. due to gait design considerations it is desired to minimize the required torques in a cycle of gait. similar to caterpillars,...

2004
Sanguk Noh Cheolho Lee Keywon Ryu Kyunghee Choi Gihyun Jung

As a vast number of services have been flooding into the Internet, it is more likely for the Internet resources to be exposed to various hacking activities such as Code Red and SQL Slammer worm. Since various worms quickly spread over the Internet using self-propagation mechanism, it is crucial to detect worm propagation and protect them for secure network infrastructure. In this paper, we prop...

2006
Jeffrey Chan Christopher Leckie Tao Peng

Internet worms are a growing menace due to their increasing sophistication and speed of propagation. In this paper, we present a new worm detection scheme, History-based IP Worm Detection. It uses the difference in the distribution of source addresses between regular users and scanning hosts to distinguish between worm probes and normal accesses. This property is used to implement a weighted so...

2018

Code Red worm can be viewed as a new generation of Internet worm that took the Internet and security community by surprise. Now there exist a few versions of Code Red worm and each new version proofs to be more malicious then the original Code Red worm. This should serve as a strong motivation for businesses and corporations alike to beef up their system's defense. Prevention is much more cost ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید