Botnet

Results: 929



#Item
41Two Methods for Detecting Malware Maciej Korczyński, Gilles Berger-Sabbatel, and Andrzej Duda Grenoble Institute of Technology, CNRS Grenoble Informatics Laboratory UMR, rue de la Passerelle, BPSaint

Two Methods for Detecting Malware Maciej Korczyński, Gilles Berger-Sabbatel, and Andrzej Duda Grenoble Institute of Technology, CNRS Grenoble Informatics Laboratory UMR, rue de la Passerelle, BPSaint

Add to Reading List

Source URL: mkorczynski.com

Language: English - Date: 2015-02-15 17:10:50
42CYBER SECURITY VOCABULARY  - For business leaders UNDERSTAND YOUR IT DEPARTMENT AND LEAD IN THE EVENT OF A CYBER CRISIS Ever found your IT team was speaking a different language when it came to cyber security?

CYBER SECURITY VOCABULARY - For business leaders UNDERSTAND YOUR IT DEPARTMENT AND LEAD IN THE EVENT OF A CYBER CRISIS Ever found your IT team was speaking a different language when it came to cyber security?

Add to Reading List

Source URL: www.controlrisks.com

Language: English - Date: 2016-08-04 06:27:46
43Challenges in Experimenting with Botnet Detection Systems

Challenges in Experimenting with Botnet Detection Systems

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-08-24 13:54:47
44Towards Complete Node Enumeration in a Peer-to-Peer Botnet Brent ByungHoon Kang1 , Eric Chan-Tin2 , Christopher P. Lee3 , James Tyra2 , Hun Jeong Kang2 , Chris Nunnery1 , Zachariah Wadler1 , Greg Sinclair1 , Nicholas Hop

Towards Complete Node Enumeration in a Peer-to-Peer Botnet Brent ByungHoon Kang1 , Eric Chan-Tin2 , Christopher P. Lee3 , James Tyra2 , Hun Jeong Kang2 , Chris Nunnery1 , Zachariah Wadler1 , Greg Sinclair1 , Nicholas Hop

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2011-08-15 19:32:40
45Be certain  MessageLabs Intelligence: October 2006 “Do you want spam with that spam?” Introduction

Be certain MessageLabs Intelligence: October 2006 “Do you want spam with that spam?” Introduction

Add to Reading List

Source URL: londonactionplan.org

Language: English - Date: 2016-04-26 15:59:23
46Computer network security / Multi-agent systems / Spamming / Aquatic ecology / Fisheries / Algal bloom / Botnet / Great Lakes / Lake / Harmful algal bloom / Harmful Algal Bloom and Hypoxia Research and Control Amendments Act

For a Healthy Great Lakes Ecosystem Share What You See http://glri.wher.org Report sightings of sick/dead birds, algal blooms, and other environmental observations around the Great Lakes

Add to Reading List

Source URL: www.wdin.org

Language: English - Date: 2011-09-23 12:49:50
47Microsoft Word - DNS Whitepaper_Resource Exhaustion_October_2014_v2.docx

Microsoft Word - DNS Whitepaper_Resource Exhaustion_October_2014_v2.docx

Add to Reading List

Source URL: www.cloudmark.com

Language: English - Date: 2014-10-07 15:50:23
48For Good Measure  Progress Is Infectious Daniel E. Geer Jr. | In-Q-Tel Daniel B. Larremore | Harvard School of Public Health

For Good Measure Progress Is Infectious Daniel E. Geer Jr. | In-Q-Tel Daniel B. Larremore | Harvard School of Public Health

Add to Reading List

Source URL: danlarremore.com

Language: English - Date: 2012-12-18 10:08:00
49Sandnet: Network Traffic Analysis of Malicious Software Christian Rossow1,2 , Christian J. Dietrich1,3 , Herbert Bos2 , Lorenzo Cavallaro2 , Maarten van Steen2 , Felix C. Freiling3 , Norbert Pohlmann1 1  Institute for In

Sandnet: Network Traffic Analysis of Malicious Software Christian Rossow1,2 , Christian J. Dietrich1,3 , Herbert Bos2 , Lorenzo Cavallaro2 , Maarten van Steen2 , Felix C. Freiling3 , Norbert Pohlmann1 1 Institute for In

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-12-21 09:55:27
50Whitepaper Industrial Control System Security COVER

Whitepaper Industrial Control System Security COVER

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2016-05-16 11:11:13