2009 International Conference on CyberWorlds 2009
DOI: 10.1109/cw.2009.13
|View full text |Cite
|
Sign up to set email alerts
|

STAKCERT Framework in Eradicating Worms Attack

Abstract: A worm attack is one of the most eye-catching and challenging issues in the cyber world. New and different types of worm attacks are being introduced day by day. Different names have been given to these worms as they evolve such as the 'superworm' and researchers all over the world are trying to find the best remedy to counter such attacks. Loss of money, productivity and reputation are amongst some of the well know implication from these types of attacks. Motivated by the consequences caused by the worm attac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…27 Madihah Mohd Saudi and colleagues researched apoptosis with respect to security systems, focusing on network problems, and later applied it specifically to worm attacks. 28,29 Finally, David Jones implemented apoptotic self-destruct and "stay alive" signaling while investigating memory requirements in inheritance versus an abstract-oriented approach. 30 The majority of these applications fall into the weak apoptotic computing (programmed death) category, and would likely benefit from, instead, utilizing a strong (programmed death by default) approach.…”
Section: The Evolving State Of the Artmentioning
confidence: 99%
“…27 Madihah Mohd Saudi and colleagues researched apoptosis with respect to security systems, focusing on network problems, and later applied it specifically to worm attacks. 28,29 Finally, David Jones implemented apoptotic self-destruct and "stay alive" signaling while investigating memory requirements in inheritance versus an abstract-oriented approach. 30 The majority of these applications fall into the weak apoptotic computing (programmed death) category, and would likely benefit from, instead, utilizing a strong (programmed death by default) approach.…”
Section: The Evolving State Of the Artmentioning
confidence: 99%