Botnet

Results: 929



#Item
111

CoCoSpot: Clustering and Recognizing Botnet Command and Control Channels using Traffic Analysis1 Christian J. Dietricha,c , Christian Rossowa,b , Norbert Pohlmanna a Institute for Internet Security, University of Applie

Add to Reading List

Source URL: blog.cj2s.de

Language: English - Date: 2012-10-24 10:24:18
    112

    «LEGAL LIMITS OF PROACTIVE ACTIONS: COREFLOOD BOTNET EXAMPLE» OĞUZ KAAN PEHLİVAN INTERNATIONAL STRATEGIC RESEARCH ORGANIZATION Operation Odeona

    Add to Reading List

    Source URL: www.botconf.eu

    Language: English - Date: 2014-12-07 18:20:43
      113

      Towards Complete Node Enumeration in a Peer-to-Peer Botnet Brent ByungHoon Kang1 , Eric Chan-Tin2 , Christopher P. Lee3 , James Tyra2 , Hun Jeong Kang2 , Chris Nunnery1 , Zachariah Wadler1 , Greg Sinclair1 , Nicholas Hop

      Add to Reading List

      Source URL: syssec.kaist.ac.kr

      Language: English - Date: 2012-09-03 21:42:58
        114

        So You Want to Take Over a Botnet... David Dittrich Applied Physics Laboratory University of Washington Abstract Computer criminals regularly construct large distributed attack networks comprised of many thousands

        Add to Reading List

        Source URL: staff.washington.edu

        Language: English - Date: 2012-03-27 18:48:52
          115

          The Role of ISPs in Botnet Mitigation An Empirical Analysis Based on Spam Data Michel van Eeten* Johannes M. Bauer** Hadi Asghari*

          Add to Reading List

          Source URL: weis2010.econinfosec.org

          Language: English
            116

            graphs/botnet_cluster_sizes_cdf.eps

            Add to Reading List

            Source URL: www.cs.jhu.edu

            Language: English - Date: 2007-11-07 18:55:15
              117Computer network security / Spamming / Computing / Honeynet Project / Honeypot / Botnet

              honeynet_letter_julia_v3.indd

              Add to Reading List

              Source URL: warsaw2014.honeynet.org

              Language: English - Date: 2014-01-16 05:46:04
              118Computing / Concurrent computing / Distributed data storage / Computer network security / Multi-agent systems / Spamming / File sharing networks / Botnet / Storm botnet / Peer-to-Peer Protocol / Kademlia / Distributed hash table

              PDF Document

              Add to Reading List

              Source URL: www-users.cs.umn.edu

              Language: English - Date: 2009-03-17 14:13:56
              119

              A Multifaceted Approach to Understanding the Botnet Phenomenon Moheeb Abu Rajab Jay Zarfoss

              Add to Reading List

              Source URL: www.cs.jhu.edu

              Language: English - Date: 2006-09-25 13:23:47
                120

                Poster: Mongoose, A Novel Lightweight CrossPlatform Botnet Over TOR Joshua Pritchett1 1 Department of Computer Science Keene State College, USNH

                Add to Reading List

                Source URL: www.ieee-security.org

                Language: English - Date: 2015-05-11 16:42:27
                  UPDATE