Botnet

Results: 929



#Item
251Email spam / Anti-spam techniques / Spam / Botnet / Email address harvesting / Storm botnet / DNSBL / Email / Open mail relay / Spamming / Computing / Internet

On the Spam Campaign Trail † ∗ ∗

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-04-09 18:00:45
252Multi-agent systems / Botnets / Internet / Rustock botnet / Email spam / Spam / Mega-D botnet / Cutwail botnet / Deep packet inspection / Computing / Spamming / Computer network security

Emergency Slice and In-Network DPI as application of network virtualization Japan-EU Workshop on Future Internet/New Generation Network Aki Nakao University of Tokyo

Add to Reading List

Source URL: www.prime-pco.com

Language: English - Date: 2012-01-30 05:25:35
253Computer network security / Multi-agent systems / Email / Spam filtering / Email spam / Botnet / Spam / The Spamhaus Project / DNSBL / Spamming / Computing / Internet

Spamming Botnets: Signatures and Characteristics Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Geoff Hulten+ , Ivan Osipkov+ Microsoft Research, Silicon Valley + Microsoft Corporation

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2008-10-21 14:44:49
254Anti-spam techniques / Email spam / Twitter / Spam / URL shortening / Phishing / Blacklist / Email / Storm botnet / Spamming / Internet / Computing

@spam: The Underground on 140 Characters or Less ∗ † Chris Grier ∗

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2010-10-17 18:10:59
255Pay per click search engines / Electronic commerce / Advertising / Computer network security / Click fraud / Online advertising / Botnet / AdWords / Ad serving / Internet / Internet marketing / Computing

The ZeroAccess Auto-Clicking and Search-Hijacking Click Fraud Modules (Technical Report) †∗ †∗

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2014-09-30 19:09:50
256Concurrent computing / Alert Logic / Cloud computing security / Malware / Honeypot / Attack / Botnet / Data center / Computer security / Computer network security / Computing / Cloud computing

Research on the Evolving State of Cloud Security Spring 2014 Research on the Evolving State of Cloud Security Spring 2014

Add to Reading List

Source URL: www.tierpoint.com

Language: English - Date: 2014-10-17 17:39:07
257Spamming / Cyberwarfare / Botnets / Denial-of-service attacks / Denial-of-service attack / Fast flux / Storm Worm / Agobot / Internet Relay Chat / Computer network security / Computing / Multi-agent systems

Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods Elizabeth Stinson Stanford University John C. Mitchell

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2010-03-09 22:02:42
258Compensation / Internet marketing / Electronic commerce / Pricing / Consumer fraud / Botnet / Click fraud / Online advertising / Pay per click / Internet / Business / Marketing

What’s Clicking What? Techniques and Innovations of Today’s Clickbots∗ Brad Miller1 , Paul Pearce1 , and Chris Grier12 , Christian Kreibich2 , Vern Paxson12 1 Computer Science Division

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2011-04-23 12:56:27
259FTP clients / Internet Explorer / Human–computer interaction / Spamming / News aggregators / Malware / Botnet / World Wide Web / Phishing / Computing / Software / Microsoft Windows

The Leader in Cloud Security RESEARCH REPORT STATE OF THE WEB – Q2 2010

Add to Reading List

Source URL: www.zscaler.com

Language: English - Date: 2015-04-01 12:38:28
260Multi-agent systems / Botnets / Domain name system / Storm botnet / Fast flux / Server / Computer network security / Spamming / Computing

Geolocalization of Proxied Services and its Application to Fast-Flux Hidden Servers Claude Castelluccia, Mohamed Ali Kaafar, Pere Manils, Daniele Perito INRIA Rhone-Alpes Grenoble – France

Add to Reading List

Source URL: planete.inrialpes.fr

Language: English - Date: 2010-04-16 08:57:42
UPDATE