Botnet

Results: 929



#Item
241Computing / Honeypot / Client honeypot / Botnet / Exploit / Denial-of-service attack / Vulnerability / Computer insecurity / Malware / Computer network security / Cyberwarfare / Computer security

The Impact of Honeynets for CSIRTs Jan Kohlrausch and Jochen Schönfelder DFN-CERT Services GmbH Heidenkampsweg 41 DHamburg [kohlrausch|schoenfelder]@dfn-cert.de

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-05-06 13:18:12
242Compensation / Internet marketing / Electronic commerce / Pricing / Consumer fraud / Botnet / Click fraud / Online advertising / Pay per click / Internet / Business / Marketing

What’s Clicking What? Techniques and Innovations of Today’s Clickbots∗ Brad Miller1 , Paul Pearce1 , and Chris Grier12 , Christian Kreibich2 , Vern Paxson12 1 Computer Science Division

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2014-02-17 17:32:41
243Spamming / Botnets / Cyberwarfare / Computer security / FireEye /  Inc. / Denial-of-service attack / BredoLab botnet / Zombie / Waledac botnet / Computer network security / Computing / Multi-agent systems

Harvard Journal of Law & Technology Volume 28, Number 1 Fall 2014 MICROSOFT THE BOTNET HUNTER: THE ROLE OF PUBLIC-PRIVATE PARTNERSHIPS IN MITIGATING BOTNETS

Add to Reading List

Source URL: jolt.law.harvard.edu

Language: English - Date: 2015-04-09 10:45:05
244Network architecture / Border Gateway Protocol / DNSBL / Email spam / Spam / Open mail relay / IP address / Botnet / Classless Inter-Domain Routing / Internet / Computing / Spamming

Spamming with BGP Spectrum Agility Anirudh Ramachandran Nick Feamster Georgia Tech

Add to Reading List

Source URL: nanog.org

Language: English - Date: 2008-07-29 10:20:52
245Software / Underground culture / Cryptographic software / Tor / .onion / Internet protocols / Port / Botnet / The Hidden Wiki / Internet / Computing / Internet privacy

Content and popularity analysis of Tor hidden services arXiv:1308.6768v1 [cs.CR] 30 Aug 2013 July 29, 2013 Alex Biryukov

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2013-09-02 16:59:38
246Computing / Cyberwarfare / Radio-frequency identification / Verisign / Denial-of-service attacks / Denial-of-service attack / Root name server / Internet security / Botnet / Computer network security / Domain name system / Internet

VRSN_logo_vertical_CMYK_vector

Add to Reading List

Source URL: www.verisigninc.com

Language: English - Date: 2015-04-16 16:20:08
247Spamming / Botnets / Internet Relay Chat / Storm botnet / Peer-to-peer / Internet Relay Chat bot / Fast flux / Denial-of-service attack / Storm Worm / Computing / Computer network security / Multi-agent systems

Discovery techniques for P2P botnets David Dittrich Applied Physics Laboratory University of Washington

Add to Reading List

Source URL: jjcweb.jjay.cuny.edu

Language: English - Date: 2014-12-03 00:00:08
248Computer network security / Multi-agent systems / Electronic commerce / Botnets / Internet bot / Rustock botnet / Denial-of-service attack / Web search query / Click fraud / Computing / Spamming / Internet

SBotMiner: Large Scale Search Bot Detection Fang Yu, Yinglian Xie, and Qifa Ke Microsoft Research Silicon Valley Mountain View, CAUSA fangyu,yxie,

Add to Reading List

Source URL: www.wsdm-conference.org

Language: English - Date: 2009-12-30 02:07:56
249Consumer fraud / Internet fraud / Internet marketing / Computer network security / Click fraud / Online advertising / Botnet / Affiliate marketing / Click farm / Internet / Electronic commerce / Business

Characterizing Large-Scale Click Fraud in ZeroAccess †✸ †✸ ✷

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2014-09-30 19:09:49
250Botnet / Firewall / Active Directory / Operating system / Windows Registry / Computer network security / Computing / System software

training.keywcorp.com This two-week course teaches students current cyber attack methods in order to develop business strategies to protect and defend their networks and critical information. Classroom discussion and ex

Add to Reading List

Source URL: training.keywcorp.com

Language: English - Date: 2015-02-20 11:19:54
UPDATE