How to hook worms [computer network security] | IEEE Journals & Magazine | IEEE Xplore