Login / Signup
Containment of network worms via per-process rate-limiting.
Yuanyuan Zeng
Xin Hu
Haixiong Wang
Kang G. Shin
Abhijit Bose
Published in:
SecureComm (2008)
Keyphrases
</>
network traffic
data flow
data sets
databases
mobile devices
evolutionary algorithm
peer to peer
computer networks
network resources