Login / Signup

Containment of network worms via per-process rate-limiting.

Yuanyuan ZengXin HuHaixiong WangKang G. ShinAbhijit Bose
Published in: SecureComm (2008)
Keyphrases
  • network traffic
  • data flow
  • data sets
  • databases
  • mobile devices
  • evolutionary algorithm
  • peer to peer
  • computer networks
  • network resources