Botnet

Results: 929



#Item
471Computing / Botnet / Denial-of-service attack / Identity theft / Password / Information warfare / Threat / War / Malware / Computer network security / Cyberwarfare / Computer security

Conducting Defensive Information Warfare on Open Platforms 23rd October 2013 – LinuxCon Europe Ben Tullis – (formerly of) LinuxIT (Europe) Ltd.

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2013-10-19 16:33:05
472Spamming / Spam filtering / Simple Mail Transfer Protocol / Computer network security / Extended SMTP / Greylisting / Message transfer agent / Botnet / Anti-spam techniques / Email / Computer-mediated communication / Computing

B@bel: Leveraging Email Delivery for Spam Mitigation Gianluca Stringhini§ , Manuel Egele§ , Apostolis Zarras‡ , Thorsten Holz‡ , Christopher Kruegel§ , and Giovanni Vigna§ § ‡

Add to Reading List

Source URL: cs.ucsb.edu

Language: English - Date: 2012-06-20 13:37:40
473Consumer fraud / Internet fraud / Internet marketing / Computer network security / Click fraud / Online advertising / Botnet / Affiliate marketing / Click farm / Internet / Electronic commerce / Business

Characterizing Large-Scale Click Fraud in ZeroAccess †✸ †✸ ✷

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2014-09-07 19:52:36
474Botnet / Anti-spam techniques / Email spam / Spam / Internet bot / Rustock botnet / Email / Open mail relay / Malware / Spamming / Computing / Internet

The Tricks of the Trade: What Makes Spam Campaigns Successful? Jane Iedemska, Gianluca Stringhini, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna University of California, Santa Barbara {7 am, gianluca, kemm,

Add to Reading List

Source URL: cs.ucsb.edu

Language: English - Date: 2014-04-02 15:05:37
475Intrusion detection systems / Computer security / Multi-agent systems / Intrusion prevention system / Network intrusion detection system / Host-based intrusion detection system / Anomaly detection / Botnet / Antivirus software / Computer network security / System software / Computing

Microsoft Word - aaai_final.doc

Add to Reading List

Source URL: www.aaai.org

Language: English - Date: 2008-03-11 15:26:12
476Spamming / Internet / Botnets / Internet privacy / Tor / McColo / WikiLeaks / Rustock botnet / Storm botnet / Computing / Multi-agent systems / Computer network security

Resilient Botnet Command and Control with Tor

Add to Reading List

Source URL: www.defcon.org

Language: English - Date: 2010-08-20 12:34:32
477Cybercrime / Cyberwarfare / Denial-of-service attacks / Spamming / Denial-of-service attack / Internet Relay Chat / Botnet / Anonymous / Computer network security / Computing / Multi-agent systems

[removed]DDoS Threat Landscape Report Introduction

Add to Reading List

Source URL: www.imperva.com

Language: English - Date: 2014-03-31 12:42:06
478Botnets / Spamming / Cyberwarfare / Zeus / Malware / Denial-of-service attack / Storm botnet / Srizbi botnet / Computer network security / Computing / Multi-agent systems

Becoming the Six-Million-Dollar Man Diary of a Professional Botmaster

Add to Reading List

Source URL: media.blackhat.com

Language: English
479System software / Cyberwarfare / Cisco IOS / Routers / Cisco Systems / Denial-of-service attack / Computer worm / Botnet / SQL Slammer / Computing / Denial-of-service attacks / Computer network security

SERVICE PROVIDER INFRASTRUCTURE SECURITY BEST PRACTICES Yusuf Bhaiji – Cisco Systems © 2005 Cisco Systems, Inc. All rights reserved.

Add to Reading List

Source URL: www.menog.org

Language: English - Date: 2012-01-19 09:39:46
480Multi-agent systems / Botnets / Cyberwarfare / Malware / Srizbi botnet / Storm botnet / Torpig / Mebroot / Fast flux / Computing / Spamming / Computer network security

Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Department of Computer S

Add to Reading List

Source URL: www.catonmat.net

Language: English - Date: 2010-04-12 16:52:45
UPDATE