Botnet

Results: 929



#Item
121Computer security / Malware / JavaScript / Threat / Change detection / Botnet / Computer network security / Computing / Cyberwarfare

Poster: Web Change Analysis Approach for Malicious Website Detection SangYong Choi HoMook Cho

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:22
122Security / OpenDNS / Spamming / Malware / Network security / Botnet / Cloud computing / Computer security / Computing / Computer network security / FireEye /  Inc.

Feature Brief: FireEye Integration Global Protection Against Advanced Malware Together, OpenDNS and FireEye give you the power to block advanced malware behind and beyond the network perimeter,

Add to Reading List

Source URL: info.opendns.com

Language: English - Date: 2015-07-19 04:19:31
123Computing / Computer crimes / Computer network security / Multi-agent systems / Malware / Botnet / Phishing / Anti-spam techniques / Social engineering / Spamming / Cybercrime / Internet

PDF Document

Add to Reading List

Source URL: londonactionplan.org

Language: English - Date: 2015-06-09 08:46:46
124Denial-of-service attacks / Routing / Distributed computing architecture / Network architecture / Overlay network / Denial-of-service attack / Null route / Router / Botnet / Computing / Concurrent computing / Computer network security

Denial of Service Attacks and Resilient Overlay Networks Angelos D. Keromytis Network Security Lab Computer Science Department, Columbia University

Add to Reading List

Source URL: www.nis-summer-school.eu

Language: English - Date: 2008-10-20 04:40:05
125Computer security / Social engineering / Rogue software / Scareware / Computer network security / Malware / Rogue security software / Botnet / Proxy server / System software / Antivirus software / Computing

Chapter 1 The Underground Economy of Fake Antivirus Software Brett Stone-Gross, Ryan Abman, Richard A. Kemmerer, Christopher Kruegel, Douglas G. Steigerwald and Giovanni Vigna

Add to Reading List

Source URL: econ.ucsb.edu

Language: English - Date: 2011-11-28 14:00:22
126

Clasificaci´on supervisada de paquetes procedentes de una botnet HTTP F´elix Brezo, Jos´e Gaviria de la Puerta, Xabier Ugarte-Pedrero, Igor Santos, Pablo G. Bringas David Barroso

Add to Reading List

Source URL: paginaspersonales.deusto.es

Language: Spanish - Date: 2012-10-08 08:27:20
    127

    Mod´elisation et simulation du canal de communication d’un botnet pour l’´evaluation des syst`emes de d´etection d’intrusion r´eseau Georges Bossert Guillaume Hiet

    Add to Reading List

    Source URL: www.netzob.org

    Language: French - Date: 2015-04-21 11:46:12
      128Internet / Anomaly detection / Data mining / Data security / Computer security / Malware / Botnet / Domain Name System / Anomaly / Computer network security / Computing / Spamming

      ThetaRay_Logo_Options_Draft7

      Add to Reading List

      Source URL: www.thetaray.com

      Language: English - Date: 2014-12-06 20:02:21
      129

      Reverse and Simulate your Enemy Botnet C&C Blackhat Abu Dhabi December

      Add to Reading List

      Source URL: www.netzob.org

      - Date: 2015-04-21 11:46:12
        130

        Modélisation et simulation du canal de communication d’un botnet pour l’évaluation des NIDS Georges Bossert 1 2 , Guillaume Hiet 2 , Thibaut Henin 1 1 2

        Add to Reading List

        Source URL: www.netzob.org

        Language: French - Date: 2015-04-21 11:46:12
          UPDATE