3 research outputs found

    Selected Computing Research Papers Volume 4 June 2015

    Get PDF
    A Critical Study of Current Natural Language Processing Methods for the Semantic Web (Lee Bodak) .................................................................................................................. 1 A Critical Evaluation on Current Wireless Wearable Sensors in Monitoring of Patients (Mmoloki Gogontle Gontse) ................................................................................... 7 Evaluation on Research targeted towards Worm Viruses and Detection Methods (Adam Keith) ...................................................................................................................... 13 Evaluation of Security Techniques in Cloud Storage Systems (Aone Maenge) ................ 21 An Evaluation of Current Power Management Techniques Used In Mobile Devices (Gabriel Tshepho Masabata) ............................................................................................... 27 An Evaluation Of Current Wide Area Network Cyber Attack Detection Methods Aimed At Improving Computer Security (Hayley Roberts) ............................................... 35 Current EMG Pattern Recognition Research Aimed At Improving Upper Limb Prosthesis Control (Molly Sturman) ................................................................................... 41 Positive and Negative: Effects Video Game Use Can Have on Personality Development (Shaun Watson) ............................................................................................ 4

    Detecting Internet Worms at Early Stage

    No full text
    Managing the security of enterprise networks has emerged to be a critical problem in the era of Internet economy. Arising as a leading threat, worms repetitively caused enormous damage to the Internet community during the past years. A new security service that monitors the ongoing worm activities on the Internet will greatly contribute to the security management of modern enterprise networks. This paper proposes an Internet-worm early warning system that automatically detects concerted scan activities and derives possible signatures of worm attacks. Its goal is to issue warning at the early stage of worm propagation and to provide necessary information for security analysts to control the damage. It reduces false positives by filtering out false scan sources. The system is locally deployable or can be co-deployed amongst a group of enterprise networks. We provide both analytical and simulation studies on the responsiveness of this early warning system

    Detecting Internet worms at early stage

    No full text
    corecore