DocumentCode
526452
Title
Notice of Retraction
The research and development of worm defense strategies
Author
Liuqi ; Ma Guoqing
Author_Institution
State Key Lab. of Inf. Security, Grad. Univ. of Chinese Acad. of Sci., Beijing, China
Volume
1
fYear
2010
fDate
9-11 July 2010
Firstpage
168
Lastpage
171
Abstract
Notice of Retraction
After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE´s Publication Principles.
We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.
The presenting author of this paper has the option to appeal this decision by contacting TPII@ieee.org.
The deterioration of worm propagation on internet in recent years has pushed the research in the field of worm defense, as a result there are coming up plenty of worm defense strategies. This paper refers to make the systematic study of the complete worm defense strategies and provide taxonomy of worm defense system strategies according to the key factors of each defense category. As guideline for the design of worm defense, we compare the present evaluation of the worm defense strategies, and give a highlight on the trendy of worm defense in the future at the end.
After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE´s Publication Principles.
We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.
The presenting author of this paper has the option to appeal this decision by contacting TPII@ieee.org.
The deterioration of worm propagation on internet in recent years has pushed the research in the field of worm defense, as a result there are coming up plenty of worm defense strategies. This paper refers to make the systematic study of the complete worm defense strategies and provide taxonomy of worm defense system strategies according to the key factors of each defense category. As guideline for the design of worm defense, we compare the present evaluation of the worm defense strategies, and give a highlight on the trendy of worm defense in the future at the end.
Keywords
Internet; invasive software; Internet; defense category; worm defense strategies; worm propagation; Analytical models; Emulation; Grippers; defense; evaluation; math modeling; simulation; worm;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on
Conference_Location
Chengdu
Print_ISBN
978-1-4244-5537-9
Type
conf
DOI
10.1109/ICCSIT.2010.5564062
Filename
5564062
Link To Document