Botnet

Results: 929



#Item
21

Technical Advisory: CVEs Assigned to Upstream Devices Exploited by Mirai IoT Botnet Advisory #1 Product: All known XiongMai Technology Devices Type of Device: IP Camera, DVR and NVR Type of Vulnerability: Default Authent

Add to Reading List

Source URL: www.flashpoint-intel.com

- Date: 2016-10-06 18:50:12
    22

    Microsoft Word - proactive-botnet-countermeasures.doc

    Add to Reading List

    Source URL: four.cs.uni-bonn.de

    - Date: 2009-10-22 05:16:21
      23

      Discovering a botnet from Russia (With love) Damien Aumaitre - Christophe Devaux - Julien Lenoir - Sogeti/ESEC

      Add to Reading List

      Source URL: esec-lab.sogeti.com

      - Date: 2016-07-01 12:08:46
        24Computing / Computer network security / Cyberwarfare / Multi-agent systems / Spamming / Recreational Software Advisory Council / Self-censorship / Botnet / Malware / Bitstream Cyberbit / Steganography / Censorship

        SESSION ID: GPS2-F04 A Global Enterprise Confronts Targeted Attacks Ginnwann Teo Head of Pre-Sales

        Add to Reading List

        Source URL: www.rsaconference.com

        Language: English - Date: 2016-07-18 23:27:59
        25Computing / Spamming / Cyberspace / Email spam / Anti-spam techniques / Email / Botnet / Computer virus / Antivirus software / MessageLabs / Storm botnet

        Microsoft Word - MLI January 06 Report _PW-FINAL1_.doc

        Add to Reading List

        Source URL: londonactionplan.org

        Language: English - Date: 2016-04-26 15:59:17
        26Computing / Routing algorithms / Cyberwarfare / Concurrent computing / Denial-of-service attack / Denial-of-service attacks / Internet Relay Chat / Computer network / Multipath routing / Botnet / Routing / Crowds

        On the Interplay of Link-Flooding Attacks and Traffic Engineering Dimitrios Gkounis1 , Vasileios Kotronis2 , Christos Liaskos3 , Xenofontas Dimitropoulos3∗ 1 NEC 2 ETH Zurich, Switzerland

        Add to Reading List

        Source URL: inspire.edu.gr

        Language: English - Date: 2016-04-22 11:14:02
        27Computing / Network performance / Computer network security / Network management / Cyberwarfare / Multi-agent systems / Spamming / Botnet / Transmission Control Protocol / Traffic classification / Denial-of-service attack / Measuring network throughput

        C:/Users/beck/Desktop/CSET CONFERENCE 2010/USENIX template/4_11_DRAFT2/jayaram_drmiller changes/FINAL_SUBMISSION_AFTER REVIEW/CSET_submission.dvi

        Add to Reading List

        Source URL: static.usenix.org

        Language: English - Date: 2011-07-08 13:42:23
        28Malware / Computing / Computer network security / Multi-agent systems / Spamming / Cyberwarfare / Computer security / Malware analysis / Botnet

        Impeding Automated Malware Analysis Paul Royal College of Computing Georgia Institute of Technology

        Add to Reading List

        Source URL: countermeasure2012.com

        Language: English - Date: 2012-11-01 08:16:33
        29Cyberwarfare / Computer security / Computing / Malware / Computer network security / Multi-agent systems / Spamming / Malware analysis / Antivirus software / Computer virus / Rootkit / Botnet

        Prudent Practices for Designing Malware Experiments: Status Quo and Outlook

        Add to Reading List

        Source URL: norbert-pohlmann.com

        Language: English - Date: 2015-10-20 13:17:19
        30Computing / Computer network security / Cyberwarfare / Computer security / Multi-agent systems / Spamming / Intrusion detection system / Malware / Computer virus / Botnet / Alert correlation / Infection

        BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology

        Add to Reading List

        Source URL: www.cyber-ta.org

        Language: English - Date: 2007-06-29 16:14:13
        UPDATE