Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: ((word attack) OR (worm attack)) technical paper
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Search alternatives
:
technical paper »
technical papers
word attack »
world attack
,
work attack
,
world attacks
Showing
1
-
19
of
19
Search:
'((word attack) OR (worm attack)) technical paper'
,
query time: 0.23s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Recent Advances in Intrusion Detection : 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers
Published 2006
Springer Berlin Heidelberg
Table of Contents:
“
...
Worm
Detection and Containment (I) -- Virtual Playgrounds for
Worm
Behavior Investigation...
”
Read Now
2
Information Security Applications : 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers
Published 2012
Springer Berlin Heidelberg
Table of Contents:
“
...Security on LBlock against Biclique Cryptanalysis -- Improved Impossible Differential
Attacks
...
”
Read Now
3
Financial Cryptography and Data Security : FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers
Published 2020
Springer International Publishing
Table of Contents:
“
... -- Sluggish Mining: Profiting from the Verier's Dilemma -- Deploying Pay
Word
on Ethereum -- SoK: Development...
”
Read Now
4
Recent Advances in Intrusion Detection : 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004, Proceedings
Published 2004
Springer Berlin Heidelberg
Table of Contents:
“
... Policy -- Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry
Attacks
...
”
Read Now
5
Detection of Intrusions and Malware, and Vulnerability Assessment : Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings
Published 2005
Springer Berlin Heidelberg
Table of Contents:
“
... for Capturing and Analyzing Novel
Worms
for Unknown Vulnerabilities -- A Pointillist Approach for Comparing...
”
Read Now
6
Information Security Practice and Experience : Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings
Published 2006
Springer Berlin Heidelberg
Table of Contents:
“
... Comb Method for Elliptic Curve Point Multiplication -- Diophantine Approximation
Attack
on a Fast...
”
Read Now
7
Information Security : 9th International Conference; ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings
Published 2006
Springer Berlin Heidelberg
Table of Contents:
“
...A Partial Key Exposure
Attack
on RSA Using a 2-Dimensional Lattice -- On the Integration of Public...
”
Read Now
8
Research and Development in Intelligent Systems XXIII : Proceedings of AI-2006, The Twenty-sixth SGAI International Conference on Innovative Techniques and Applications of Artifici...
Published 2007
Springer London
Table of Contents:
“
...Best
Technical
Paper
-- Combining Task Execution and Background Knowledge for the Verification...
”
Read Now
9
Algorithms and Architectures for Parallel Processing : 20th International Conference, ICA3PP 2020, New York City, NY, USA, October 2–4, 2020, Proceedings, Part III
Published 2020
Springer International Publishing
Table of Contents:
“
... of Data in IoT Networks: A
Technical
Research Report -- B Efficient Thermography Guided Learning...
”
Read Now
10
Intelligence and Security Informatics : Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004, Proceedings
Published 2004
Springer Berlin Heidelberg
Table of Contents:
“
... in Information Technology Education -- Research of Characteristics of
Worm
Traffic -- Panel Discussion
Papers
...
”
Read Now
11
Security and Privacy in Social Networks and Big Data : 8th International Symposium, SocialSec 2022, Xi'an, China, October 16–18, 2022, Proceedings
Published 2022
Springer Nature Singapore
Table of Contents:
“
... Substitution
Attacks
on Identity-Based Encryption -- Authenticated Continuous Top-k Spatial Keyword Search...
”
Read Now
12
Artificial Intelligence Applications and Innovations : 6th IFIP WG 12.5 International Conference, AIAI 2010, Larnaca, Cyprus, October 6-7, 2010, Proceedings
Published 2010
Springer Berlin Heidelberg
Table of Contents:
“
... Data Mining Using Enriched Random Forests from Textual Resources and
Technical
Indicators...
”
Read Now
13
Recent Trends in Network Security and Applications : Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010 Proceedings
Published 2010
Springer Berlin Heidelberg
Table of Contents:
“
... Algorithms for Wireless Sensor Networks -- Detection and Mitigation of
Attacks
by Colluding Misbehaving Nodes...
”
Read Now
14
Information Systems Design and Intelligent Applications : Proceedings of Third International Conference INDIA 2016, Volume 3
Published 2016
Springer India
Table of Contents:
“
... Patterns -- Chapter 40. A
Technical
Review on LVRT of DFIG Systems -- Chapter 41. An AIS Based Approach...
”
Read Now
15
Intelligent Information and Database Systems : 6th Asian Conference, ACIIDS 2014, Bangkok, Thailand, April 7-9, 2014, Proceedings, Part I
Published 2014
Springer International Publishing
Table of Contents:
“
... Clustering of Features Approach -- A Copy Move Forgery Detection to Overcome Sustained
Attacks
Using Dyadic...
”
Read Now
16
Intelligent Information and Database Systems : 6th Asian Conference, ACIIDS 2014, Bangkok, Thailand, April 7-9, 2014, Proceedings, Part II
Published 2014
Springer International Publishing
Table of Contents:
“
... Clustering of Features Approach -- A Copy Move Forgery Detection to Overcome Sustained
Attacks
Using Dyadic...
”
Read Now
17
Proceedings of the Second International Conference on Computer and Communication Technologies : IC3T 2015, Volume 1
Published 2016
Springer India
Table of Contents:
“
... -- Chapter 63. Malicious File Hash Detection and Drive-by Download
Attacks
-- Chapter 64. Parameter...
”
Read Now
18
Intelligent Technologies and Engineering Systems
Published 2013
Springer New York
Table of Contents:
“
...-operative Black Hole
Attack
in MANET -- IP Address Management in Virtualized Cloud Environments -- A Fuzzy C...
”
Read Now
19
Artificial Intelligence and Evolutionary Computations in Engineering Systems : Proceedings of ICAIECES 2015
Published 2016
Springer India
Table of Contents:
“
...
Words
-- Chapter 73. Retinal Abnormality Risk Prediction Model: A Hybrid Approach Based on Vessel...
”
Back
Narrow Search
Year of Publication
From:
To:
Classification
006 - Special computer methods
7
005 - Computer programming, programs & data
5
004 - Data processing & computer science
4
621 - Applied physics
2
518 - Numerical analysis
1
Language
English
19
Collection
Springer eBooks 2005-
17
Springer Book Archives -2004
2
Author
Attachoo, Boonwat
2
Bhateja, Vikrant
2
Mandal, Jyotsna Kumar
2
Nguyen, Ngoc-Thanh
2
Satapathy, Suresh Chandra
2
Somboonviwat, Kulwadee
2
more ...
Trawinski, Bogdan
2
Valdes, Alfonso
2
Almgren, Magnus
1
Andreou, Andreas S.
1
Backes, Michael
1
Bhaskar, M. Arun
1
Boumerdassi, Selma
1
Bracciali, Andrea
1
Bramer, Max
1
Chaki, Nabendu
1
Chen, Hsinchun
1
Chen, Kefei
1
Chen, Xiaofeng
1
Clark, Jeremy
1
Coenen, Frans
1
Das, Swagatham
1
Dash, Subhransu Sekhar
1
Deng, Robert
1
Gritzalis, Stefanos
1
Huang, Xinyi
1
Huang, Yi-Cheng
1
Jonsson, Erland
1
Juang, Jengnan
1
Julisch, Klaus
1
Katsikas, Sokratis K.
1
Kruegel, Christopher
1
Kutyłowski, Mirosław
1
Lai, Xuejia
1
Leavitt, John
1
Lee, Dong Hoon
1
Meghanathan, Natarajan
1
Moore, Reagan
1
Nagamalai, Dhinaharan
1
Panigrahi, Bijaya Ketan
1
Papadopoulos, Harris
1
Pintore, Federico
1
Preneel, Bart
1
Qiu, Meikang
1
Raju, K. Srujan
1
Rønne, Peter B.
1
Tuson, Andrew
1
Udgata, Siba K.
1
Yung, Moti
1
Zamboni, Diego
1
Zeng, Daniel D.
1
Zhou, Jianying
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?lookfor=%28%28word+attack%29+OR+%28worm+attack%29%29+technical+paper&type=AllFields
Send by Email
×
Loading...