Botnet

Results: 929



#Item
151Computer network security / Multi-agent systems / Botnets / Malware / Koobface / Spam / CAPTCHA / Social networking service / HTTP cookie / Computing / Spamming / Internet

The Real Face of KOOBFACE: The Largest Web 2.0 Botnet Explained A technical paper discussing

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2012-02-02 13:30:14
152Botnet / Anti-spam techniques / Email spam / Spam / Internet bot / Rustock botnet / Email / Open mail relay / Video game bot / Spamming / Computing / Internet

2014 IEEE Security and Privacy Workshops The Tricks of the Trade: What Makes Spam Campaigns Successful? Jane Iedemska, Gianluca Stringhini, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna University of Califor

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2014-04-30 03:11:46
153Spamming / Statistics / Botnets / Bots / Storm botnet / Internet bot / Cluster analysis / Storm Worm / Hierarchical clustering / Computer network security / Computing / Multi-agent systems

BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu† , Roberto Perdisci‡ , Junjie Zhang† , and Wenke Lee† † College of Computing, Georgia Institut

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2008-07-14 18:18:35
154Network architecture / Internet privacy / Internet protocols / Internet ethics / Computer network security / Tor / Domain name / Botnet / Domain name system / Internet / Computing

A Privacy framework for DNS big data 3 October 2014 Cristian Hesselman, Jelte Jansen, Maarten Wullink, Karin Vink en Maarten Simon

Add to Reading List

Source URL: www.sidnlabs.nl

Language: English - Date: 2014-11-04 04:48:17
155Computer network security / Multi-agent systems / Spamming / File sharing networks / Deep packet inspection / Botnet / Peer-to-peer / ANts P2P / Storm botnet / Computing / Concurrent computing / Distributed computing

2014 IEEE Security and Privacy Workshops PeerShark: Detecting Peer-to-Peer Botnets by Tracking Conversations Pratik Narang, Subhajit Ray, Chittaranjan Hota

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2014-04-30 03:11:19
156Internet / Denial-of-service attacks / Cyberwarfare / Spamming / Multi-agent systems / Denial-of-service attack / Botnet / Smurf attack / Anycast / Computer network security / Computing / Network architecture

CHAPTER 21 Network Attack and Defense Whoever thinks his problem can be solved using cryptography, doesn’t understand his problem and doesn’t understand cryptography.

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:53:46
157Spamming / Botnets / Cyberwarfare / Koobface / BredoLab botnet / Information Warfare Monitor / Crimeware / Malware / Gumblar / Computer network security / Computing / Multi-agent systems

KOOBFACE: JR04-2010 Inside a Crimeware Network By NART VILLENEUVE

Add to Reading List

Source URL: www.nartv.org

Language: English - Date: 2010-11-12 14:14:17
158Internet / Proxy server / Malware / Denial-of-service attack / Botnet / Moose / Server / Router / NAT traversal / Computer network security / Computing / Network architecture

Dissecting Linux/Moose The Analysis of a Linux Router-based Worm Hungry for Social Networks Olivier Bilodeau

Add to Reading List

Source URL: www.welivesecurity.com

Language: English - Date: 2015-05-22 12:40:42
159Medical ethics / Research / Design of experiments / Pharmacology / Drug safety / Institutional review board / Research ethics / Belmont Report / Botnet / Applied ethics / Clinical research / Ethics

From the Editors Drawing the Line E

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:01:45
160Computer-mediated communication / Honeypot / Anti-spam techniques / Email spam / Open mail relay / DNSBL / Botnet / Spam / Proxy server / Spamming / Internet / Computing

Spamming Chains: A New Way of Understanding Spammer Behavior Pedro H. Calais Guerra Dorgival Guedes

Add to Reading List

Source URL: honeytarg.cert.br

Language: English - Date: 2011-03-04 18:53:06
UPDATE