Botnet

Results: 929



#Item
301Multi-agent systems / Spamming / Cyberwarfare / Malware / Zeus / Zombie / Torpig / Conficker / Denial-of-service attack / Computer network security / Computing / Botnets

Microsoft PowerPoint - botnet_detection2009.ppt

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2014-06-18 01:23:21
302Multi-agent systems / Botnets / Storm botnet / Malware / Zeus / Fast flux / Computer crime / Email spam / Zombie / Computing / Spamming / Computer network security

Microsoft PowerPoint - botnet1.ppt

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2014-06-18 01:23:21
303Antivirus software / Computer network security / Rogue software / Multi-agent systems / Spamming / Computer virus / Botnet / Spyware / Avast! / Malware / System software / Software

(3) Countermeasures against Bots Are you sure your computer is not infected with Bot?

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-29 21:17:15
304Computer network security / Internet marketing / Deception / Fraud / Tort law / Online advertising / Botnet / Organized crime / Malware / Ethics / Law / Crimes

UNDERSTANDING ONLINE TRAFFIC FRAUD Based on document published by IAB US’ Traffic of Good Intent Task Force; Adapted for Australia by the IAB Australia Brand Safety Council, July, 2014.

Add to Reading List

Source URL: www.iabaustralia.com.au

Language: English - Date: 2014-09-10 01:05:00
305Compensation / Internet marketing / Electronic commerce / Pricing / Consumer fraud / Botnet / Click fraud / Online advertising / Pay per click / Internet / Business / Marketing

What’s Clicking What? Techniques and Innovations of Today’s Clickbots∗ Brad Miller1 , Paul Pearce1 , and Chris Grier12 , Christian Kreibich2 , Vern Paxson12 1 Computer Science Division

Add to Reading List

Source URL: www.icsi.berkeley.edu

Language: English - Date: 2011-08-16 14:26:53
306Computer network security / Multi-agent systems / Cybercrime / Information technology management / Spam / Botnet / Email spam / Computing / Spamming / Internet

Thinking Like They Do: An Inside Look at Cybercriminal Operations Gianluca Stringhini University College London

Add to Reading List

Source URL: www.ucl.ac.uk

Language: English - Date: 2015-04-09 06:15:21
307Computing / Threat / Attack / Botnet / Malware / Computer network security / Computer security / Cyberwarfare

NFX FOR MSP SOLUTION BRIEF SP Detect ™

Add to Reading List

Source URL: www.blackstratus.com

Language: English - Date: 2012-05-16 16:45:11
308Cyberwarfare / Security / Denial-of-service attack / Radware / Application firewall / Network security / Application security / Botnet / Intrusion prevention system / Computer network security / Computer security / Computing

DefensePro Data Sheet DefensePro: DDoS Protection and Attack Mitigation Protect the Data Center and Network Against Emerging Network Threats In today’s info-security threat landscape, denial of service and distributed

Add to Reading List

Source URL: www.radware.com

Language: English - Date: 2015-04-14 15:45:14
309Cyberwarfare / Botnet / Denial-of-service attack / Peer-to-peer / Tor / Malware / Public-key cryptography / Mobile IP / Node / Computer network security / Computing / Cryptography

Towards Attack-Agnostic Defenses David Brumley and Dawn Song Carnegie Mellon University {dbrumley,dawnsong}@cs.cmu.edu Abstract

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
310Network protocols / Data transmission / Communications protocol / Protocols / Email / Transmission Control Protocol / Coupling / Circular buffer / EMI / Computing / Data / Information

Dispatcher: Enabling Active Botnet Infiltration using Automatic Protocol Reverse-Engineering Juan Caballero Pongsin Poosankam

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2013-09-09 05:44:56
UPDATE