Analyzing and modeling real-world phenomena with complex networks: a survey of applications
The success of new scientific areas can be assessed by their potential in contributing to new
theoretical approaches and in applications to real-world problems. Complex networks have …
theoretical approaches and in applications to real-world problems. Complex networks have …
Method and system for detecting malicious and/or botnet-related domain names
R Perdisci, W Lee - US Patent 10,027,688, 2018 - Google Patents
A method and system of detecting a malicious and/or botnet-related domain name,
comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a …
comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a …
Method and system for detecting and responding to attacking networks
D Dagon, N Feamster, W Lee, R Edmonds… - US Patent …, 2013 - Google Patents
A system and method for detecting a first network of compromised computers in a second
network of computers, comprising: collecting Domain Name System (DNS) data for the …
network of computers, comprising: collecting Domain Name System (DNS) data for the …
The monitoring and early detection of internet worms
After many Internet-scale worm incidents in recent years, it is clear that a simple self-
propagating worm can quickly spread across the Internet and cause severe damage to our …
propagating worm can quickly spread across the Internet and cause severe damage to our …
Cascading failures and resilience optimization of hospital infrastructure systems against the COVID-19
The outbreak of the Coronavirus Disease 2019 (COVID-19) has put the resilience of a
country's healthcare infrastructure to the most severe test. The challenge of taking …
country's healthcare infrastructure to the most severe test. The challenge of taking …
Method and system for determining whether domain names are legitimate or malicious
4,843,540 A 6, 1989 Stolfo 4,860,201 A 8, 1989 Stolfo et al. 5,363,473 A 11/1994 Stolfo et al.
5,497.486 A 3, 1996 Stolfo et al. 5,563,783 A 10, 1996 Stolfo et al. 5,668,897 A 9, 1997 …
5,497.486 A 3, 1996 Stolfo et al. 5,563,783 A 10, 1996 Stolfo et al. 5,668,897 A 9, 1997 …
Systems, methods, and media protecting a digital data processing device from attack
US PATENT DOCUMENTS 7,526,758 B2 4/2009 Hasse et al. 7,639,714 B2 12/2009 Stolfo
et al. 7,818,781 B2 10/2010 Golan et al. 7,975,059 B2 7/2011 Wang et al. 8,074,115 B2 …
et al. 7,818,781 B2 10/2010 Golan et al. 7,975,059 B2 7/2011 Wang et al. 8,074,115 B2 …
Method and system for detecting malicious domain names at an upper DNS hierarchy
7,277,961 7,331,060 7,372,809 7,383,577 7,424,619 7,426,576 7,448,084 7,483,947 7.487,
544 7,536,360 7,634,808 7,639,714 7,657,935 7,665,131 7,698.442 7,752,125 7,752,665 …
544 7,536,360 7,634,808 7,639,714 7,657,935 7,665,131 7,698.442 7,752,125 7,752,665 …
Spatial-temporal modeling of malware propagation in networks
Network security is an important task of network management. One threat to network security
is malware (malicious software) propagation. One type of malware is called topological …
is malware (malicious software) propagation. One type of malware is called topological …