Botnet

Results: 929



#Item
331Internet / Conficker / Dark Internet / Darknet / Botnet / Transmission Control Protocol / Computer worm / Classless Inter-Domain Routing / Computer network security / Computing / Network architecture

On The Power and Limitations of Detecting Network Filtering via Passive Observation Matthew Sargent† , Jakub Czyz‡ , Mark Allman¶ , Michael Bailey§ † Case ¶ Intl.

Add to Reading List

Source URL: mdbailey.ece.illinois.edu

Language: English - Date: 2015-03-17 16:56:19
332Spamming / Botnets / Malware / Internet Relay Chat bot / Bagle / Video game bot / Zeus / Storm Worm / Lethic botnet / Computing / Computer network security / Multi-agent systems

White Paper The New Era of Botnets By Zheng Bu, Pedro Bueno, Rahul Kashyap, and Adam Wosotowsky McAfee Labs™

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:08:16
333Multi-agent systems / Botnets / Cyberwarfare / Denial-of-service attacks / Storm botnet / Zombie / Denial-of-service attack / Malware / Storm Worm / Computer network security / Computing / Spamming

A Survey of Botnet Technology and Defenses Michael Bailey, Evan Cooke, Farnam Jahanian, Yunjing Xu University of Michigan Ann Arbor, Michigan {mibailey, emcooke, farnam, yunjing}@umich.edu

Add to Reading List

Source URL: mdbailey.ece.illinois.edu

Language: English - Date: 2014-08-05 13:28:17
334Spamming / Botnets / Malware / Internet Relay Chat bot / Bagle / Video game bot / Zeus / Storm Worm / Lethic botnet / Computing / Computer network security / Multi-agent systems

White Paper The New Era of Botnets By Zheng Bu, Pedro Bueno, Rahul Kashyap, and Adam Wosotowsky McAfee Labs™

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:08:16
335

White paper La nuova era delle botnet Di Zheng Bu, Pedro Bueno, Rahul Kashyap e Adam Wosotowsky McAfee Labs™

Add to Reading List

Source URL: www.mcafee.com

Language: Italian - Date: 2014-01-10 01:07:05
    336Computer security / Cyberwarfare / Computer network security / Cloud computing / World Wide Web / Phishing / Botnet / Cross-site scripting / Malware / Spamming / Computing / Cybercrime

    ZSCALER Web Security ONE POLICY, ONE CONSOLE, ONE GLOBAL PLATFORM AND ONE SEAMLESS SOLUTION THE ZSCALER ADVANTAGE

    Add to Reading List

    Source URL: www.ciosummits.com

    Language: English - Date: 2015-03-31 16:38:25
    337Multi-agent systems / Botnets / Cyberwarfare / Internet bot / Malware / Denial-of-service attack / Internet security / Email spam / Trojan horse / Computer network security / Computing / Spamming

    Botnet Tracking: Tools, Techniques, and Lessons Learned Dr. Jose Nazario Arbor Networks [removed] Summary

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-12-16 19:06:22
    338Denial-of-service attack / Internet Relay Chat / Prolexic Technologies / Computing / Multi-agent systems / Botnet / Computer network security / Denial-of-service attacks / Cyberwarfare

    Stopping DDoS Attacks Before They Start

    Add to Reading List

    Source URL: www.prolexic.com

    Language: English - Date: 2014-07-28 18:47:51
    339Denial-of-service attacks / Computer security / Multi-agent systems / Spamming / Prolexic Technologies / Denial-of-service attack / Botnet / Computer network security / Cyberwarfare / Computing

    DDoS Cyber Attacks Against Global Markets Highlights from a Prolexic White Paper by PLXsert www.prolexic.com What is a DDoS cyber attack?

    Add to Reading List

    Source URL: www.prolexic.com

    Language: English - Date: 2014-05-29 08:06:41
    340Denial-of-service attack / Prolexic Technologies / Intrusion prevention system / Botnet / Computer crime / Stefan Savage / Computer network security / Computing / Cyberwarfare

    Man, Machine and DDoS Mitigation The case for human cyber security expertise www.prolexic.com Automated DDoS mitigation poses risks

    Add to Reading List

    Source URL: www.prolexic.com

    Language: English - Date: 2014-03-20 17:26:53
    UPDATE