Botnet

Results: 929



#Item
21Technical Advisory: CVEs Assigned to Upstream Devices Exploited by Mirai IoT Botnet Advisory #1 Product: All known XiongMai Technology Devices Type of Device: IP Camera, DVR and NVR Type of Vulnerability: Default Authent

Technical Advisory: CVEs Assigned to Upstream Devices Exploited by Mirai IoT Botnet Advisory #1 Product: All known XiongMai Technology Devices Type of Device: IP Camera, DVR and NVR Type of Vulnerability: Default Authent

Add to Reading List

Source URL: www.flashpoint-intel.com

- Date: 2016-10-06 18:50:12
    22Microsoft Word - proactive-botnet-countermeasures.doc

    Microsoft Word - proactive-botnet-countermeasures.doc

    Add to Reading List

    Source URL: four.cs.uni-bonn.de

    - Date: 2009-10-22 05:16:21
      23Discovering a botnet from Russia (With love) Damien Aumaitre -  Christophe Devaux -  Julien Lenoir -   Sogeti/ESEC

      Discovering a botnet from Russia (With love) Damien Aumaitre - Christophe Devaux - Julien Lenoir - Sogeti/ESEC

      Add to Reading List

      Source URL: esec-lab.sogeti.com

      - Date: 2016-07-01 12:08:46
        24SESSION ID: GPS2-F04  A Global Enterprise Confronts Targeted Attacks Ginnwann Teo Head of Pre-Sales

        SESSION ID: GPS2-F04 A Global Enterprise Confronts Targeted Attacks Ginnwann Teo Head of Pre-Sales

        Add to Reading List

        Source URL: www.rsaconference.com

        Language: English - Date: 2016-07-18 23:27:59
        25Microsoft Word - MLI January 06 Report _PW-FINAL1_.doc

        Microsoft Word - MLI January 06 Report _PW-FINAL1_.doc

        Add to Reading List

        Source URL: londonactionplan.org

        Language: English - Date: 2016-04-26 15:59:17
        26On the Interplay of Link-Flooding Attacks and Traffic Engineering Dimitrios Gkounis1 , Vasileios Kotronis2 , Christos Liaskos3 , Xenofontas Dimitropoulos3∗ 1 NEC  2 ETH Zurich, Switzerland

        On the Interplay of Link-Flooding Attacks and Traffic Engineering Dimitrios Gkounis1 , Vasileios Kotronis2 , Christos Liaskos3 , Xenofontas Dimitropoulos3∗ 1 NEC 2 ETH Zurich, Switzerland

        Add to Reading List

        Source URL: inspire.edu.gr

        Language: English - Date: 2016-04-22 11:14:02
        27C:/Users/beck/Desktop/CSET CONFERENCE 2010/USENIX template/4_11_DRAFT2/jayaram_drmiller changes/FINAL_SUBMISSION_AFTER REVIEW/CSET_submission.dvi

        C:/Users/beck/Desktop/CSET CONFERENCE 2010/USENIX template/4_11_DRAFT2/jayaram_drmiller changes/FINAL_SUBMISSION_AFTER REVIEW/CSET_submission.dvi

        Add to Reading List

        Source URL: static.usenix.org

        Language: English - Date: 2011-07-08 13:42:23
        28Impeding Automated Malware Analysis Paul Royal College of Computing Georgia Institute of Technology

        Impeding Automated Malware Analysis Paul Royal College of Computing Georgia Institute of Technology

        Add to Reading List

        Source URL: countermeasure2012.com

        Language: English - Date: 2012-11-01 08:16:33
        29Prudent Practices for Designing Malware Experiments: Status Quo and Outlook

        Prudent Practices for Designing Malware Experiments: Status Quo and Outlook

        Add to Reading List

        Source URL: norbert-pohlmann.com

        Language: English - Date: 2015-10-20 13:17:19
        30BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology

        BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology

        Add to Reading List

        Source URL: www.cyber-ta.org

        Language: English - Date: 2007-06-29 16:14:13