Citation to this article as recorded by
Azeez, N.A., I. Tiko, I.M. Venter, O.F.W. Onifade and R.A. Azeez, 2011. Grid security: Evaluation of active and passive attacks with proposed countermeasures. Res. J. Inform. Technol., 3: 181-190. CrossRefDirect Link |
Rasheed, M.M., O. Ghazali and N.M. Norwawi, 2012. Intelligent signature detection for scanning internet worms. Inform. Technol. J., 11: 760-767. CrossRef |
Citation to this article as recorded by
A Dependable Model for Attaining Maximum Authentication Security Procedure in a Grid Based Environment Trends in Applied Sciences Research Vol. 7, Issue 1, 78, 2012 |
How to cite this article
M.M. Rasheed, O. Ghazali and N.M. Norwawi, 2010. Server Scanning Worm Detection by using Intelligent Failure Connection Algorithm. Research Journal of Information Technology, 2: 228-234.
URL: https://scialert.net/abstract/?doi=rjit.2010.228.234
URL: https://scialert.net/abstract/?doi=rjit.2010.228.234