Botnet

Results: 929



#Item
201Spamming / Cybercrime / Botnets / Cyberwarfare / Computer crimes / BredoLab botnet / Computer security / Internet police / Fox-IT / Computer network security / Computing / Multi-agent systems

PDF Document

Add to Reading List

Source URL: www.fox-it.com

Language: English - Date: 2015-04-22 11:55:11
202

Modelling to Simulate Botnet Command and Control Protocols for the Evaluation of Network Intrusion Detection Systems. Georges Bossert Guillaume Hiet

Add to Reading List

Source URL: www.amossys.fr

Language: French - Date: 2012-07-25 04:28:30
    203Spamming / Multi-agent systems / Bitcoin / Peer-to-peer computing / Botnet / Malware / Proxy server / Dark liquidity / Computing / Software / Computer network security

    PDF Document

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2013-05-17 10:01:42
    204Computer security / Social engineering / Rogue software / Scareware / Computer network security / Malware / Rogue security software / Botnet / Proxy server / System software / Antivirus software / Computing

    Chapter 1 The Underground Economy of Fake Antivirus Software Brett Stone-Gross, Ryan Abman, Richard A. Kemmerer, Christopher Kruegel, Douglas G. Steigerwald and Giovanni Vigna

    Add to Reading List

    Source URL: www.econ.ucsb.edu

    Language: English - Date: 2011-11-28 14:00:22
    205

    Modélisation et simulation du canal de communication d’un botnet pour l’évaluation des NIDS Georges Bossert 1 2 , Guillaume Hiet 2 , Thibaut Henin 1 1 2

    Add to Reading List

    Source URL: www.amossys.fr

    Language: French - Date: 2012-07-25 04:28:12
      206Cyberwarfare / Multi-agent systems / Spamming / Computer security / Denial-of-service attack / Botnet / Prolexic Technologies / Computer network security / Denial-of-service attacks / Computing

      PDF Document

      Add to Reading List

      Source URL: info.phishlabs.com

      Language: English - Date: 2013-12-16 08:54:15
      207Computing / Fast flux / Domain name / Domain / Malware / Name server / Whois / Time to live / Botnet / Domain name system / Internet / Network architecture

      EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis Leyla Bilge∗, Engin Kirda∗ §, Christopher Kruegel‡, and Marco Balduzzi∗ ∗ Institute Eurecom, Sophia Antipolis

      Add to Reading List

      Source URL: www.iseclab.org

      Language: English - Date: 2010-12-01 15:42:09
      208Anti-spam techniques / Spam / Email spam / Botnet / Storm botnet / Email filtering / Email / Spam email delivery / Srizbi botnet / Spamming / Computing / Internet

      Spamalytics: An Empirical Analysis of Spam Marketing Conversion

      Add to Reading List

      Source URL: cseweb.ucsd.edu

      Language: English - Date: 2009-08-26 20:24:17
      209World Wide Web / Computer network security / Multi-agent systems / Web 2.0 / Social engineering / Botnet / Malware / Phishing / Zynga / Computing / Spamming / Software

      ‘PokerAgent’ Stealing overFacebook Credentials PokerAgent

      Add to Reading List

      Source URL: www.welivesecurity.com

      Language: English - Date: 2013-02-12 13:00:54
      210Computing / Honeypot / Computer emergency response team / Zero-day attack / Vulnerability / Botnet / Malware / Password / Denial-of-service attack / Computer network security / Cyberwarfare / Computer security

      Practical Experiences with the deployment of honeypots NoAH Workshop / TNC Catania 17 May 2006 DFN-CERT Services GmbH Jan Kohlrausch / CSIRT

      Add to Reading List

      Source URL: www.fp6-noah.org

      Language: English - Date: 2006-06-21 10:24:02
      UPDATE