author: paolo gastaldo

Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008

... name server, which is topologically near the infected host by analyzing DNS query streams characteristics at flow ... name server once an email worm-infected user machine has been detected to con- tain email worm propagation. References. http ...

This website uses cookies and collects data for optimal performance. Your continued use signifies agreement to our Privacy Policy.