2016 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC) 2016
DOI: 10.1109/iccic.2016.7919554
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing and developing security techniques for worms in cognitive networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 17 publications
0
1
0
Order By: Relevance
“…The authors of [13,14], respectively, carry out simulation analysis on the propagation situation of Contagion worm and topological worm. In 2016, Saini et al [15] put forward the use of dynamic isolation strategy and passive benign worms to inhibit the spread of network worms, and gave the propagation model of worms. The research focused on scanning worms with a strong attack.…”
Section: Related Workmentioning
confidence: 99%
“…The authors of [13,14], respectively, carry out simulation analysis on the propagation situation of Contagion worm and topological worm. In 2016, Saini et al [15] put forward the use of dynamic isolation strategy and passive benign worms to inhibit the spread of network worms, and gave the propagation model of worms. The research focused on scanning worms with a strong attack.…”
Section: Related Workmentioning
confidence: 99%