• SurvStat@RKI

  • Referenced in 11 articles [sw24062]
  • data reported under the German ’Protection against Infection Act’. The Robert Koch Institute (RKI) maintains ... German ‘Act on the Prevention and Control of Infectious Diseases in Man’ (Infektionsschutzgesetz, IfSG). SurvStat...
  • COVID-ABS

  • Referenced in 5 articles [sw41716]
  • different policies and non-pharmaceutical interventions for controlling the spread of the virus. This paper ... COVID-ABS, a new SEIR (Susceptible-Exposed-Infected-Recovered) agent-based model that aims...
  • BotHunter

  • Referenced in 1 article [sw21737]
  • BotHunter: Detecting malware infection through IDS-driven dialog correlation. SRI’s BotHunter system takes ... that are under control of hackers, or may be spreading malware infections. BotHunter is available...
  • InterSpread Plus

  • Referenced in 1 article [sw33832]
  • simulating contact and infection spread, and methods for simulating disease control measures are described. Data...
  • ExecScent

  • Referenced in 3 articles [sw23931]
  • live enterprise network traffic. ExecScent automatically learns control protocol templates (CPTs) from examples of known ... domains and hundreds of new infected machines, compared to using a large up-to-date...
  • Rishi

  • Referenced in 2 articles [sw21756]
  • simple, yet effective method to detect bot-infected machines within a given network that relies ... communication channel between bot and Command & Control server (C&C server). The presented techniques ... automatically generate warning emails to report infected machines to an administrator. Within the 10 GBit...
  • BotFinder

  • Referenced in 1 article [sw21738]
  • present BotFinder, a novel system that detects infected hosts in a network using only high ... identify the key features of command-and-control communication, based on observing traffic that bots ... produce in a controlled environment. Using these features, BotFinder creates models that can be deployed ... network egress points to identify infected hosts. We trained our system on a number...
  • BotProfiler

  • Referenced in 1 article [sw23891]
  • Since the cost of responding to malware infection is quite high, the number of false ... that malicious infrastructures, such as command and control, tend to be reused instead of created ... even increased the detection rate of infected hosts...
  • ogaraK

  • Referenced in 2 articles [sw35175]
  • malaria simulation computationally tractable as it models infections, not individual parasites. OgaraK is also able ... factor influencing the outcome of strategies to control or eliminate malaria. Availability: OgaraK is available...
  • NosoSim

  • Referenced in 1 article [sw20066]
  • hospitals. Over the last decades, nosocomial infections have become a major Public Health problem ... order to devise and assess the best control strategies. Here, we present an agent-based...
  • C-XSC 2.0

  • Referenced in 127 articles [sw00182]
  • A C++ class library for extended scientific computing...
  • Expokit

  • Referenced in 198 articles [sw00258]
  • Expokit provides a set of routines aimed at...
  • GAUSS

  • Referenced in 119 articles [sw00322]
  • The GAUSS Mathematical and Statistical System is a...
  • LANCELOT

  • Referenced in 306 articles [sw00500]
  • LANCELOT. A Fortran package for large-scale nonlinear...
  • LEDA

  • Referenced in 263 articles [sw00509]
  • In the core computer science areas -- data structures...
  • Maple

  • Referenced in 5363 articles [sw00545]
  • The result of over 30 years of cutting...
  • MATCONT

  • Referenced in 442 articles [sw00551]
  • MATCONT: Matlab software for bifurcation study of dynamical...
  • Mathematica

  • Referenced in 6337 articles [sw00554]
  • Almost any workflow involves computing results, and that...
  • Matlab

  • Referenced in 13460 articles [sw00558]
  • MATLAB® is a high-level language and interactive...
  • NAG

  • Referenced in 423 articles [sw00610]
  • Produced by experts for use in a variety...