Login / Signup
Containing Hitlist-Based Worms with Polymorphic Signatures.
Theodor Richardson
Chin-Tser Huang
Published in:
ICCCN (2007)
Keyphrases
</>
malicious traffic
network traffic
detection mechanism
signature verification
intrusion detection
signature recognition
signature scheme
real time
databases
real world
information retrieval
information systems
decision making
case study
multiscale
digital libraries