Botnet

Results: 929



#Item
41Software / Computing / Cyberwarfare / Computer network security / Internet Standards / Multi-agent systems / Spamming / Transmission Control Protocol / Skype / Botnet / Transport Layer Security / Network packet

Two Methods for Detecting Malware Maciej Korczyński, Gilles Berger-Sabbatel, and Andrzej Duda Grenoble Institute of Technology, CNRS Grenoble Informatics Laboratory UMR, rue de la Passerelle, BPSaint

Add to Reading List

Source URL: mkorczynski.com

Language: English - Date: 2015-02-15 17:10:50
42Cyberwarfare / Cybercrime / Computer network security / Spamming / National security / Botnet / Computer security / Phishing / Malware / Ransomware / Storm botnet / Supply chain attack

CYBER SECURITY VOCABULARY - For business leaders UNDERSTAND YOUR IT DEPARTMENT AND LEAD IN THE EVENT OF A CYBER CRISIS Ever found your IT team was speaking a different language when it came to cyber security?

Add to Reading List

Source URL: www.controlrisks.com

Language: English - Date: 2016-08-04 06:27:46
43Computer network security / Multi-agent systems / Spamming / Botnet / Cyberwarfare / Distributed computing

Challenges in Experimenting with Botnet Detection Systems

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-08-24 13:54:47
44Distributed data storage / Computer network security / Multi-agent systems / Spamming / File sharing networks / Botnet / Storm botnet / Peer-to-Peer Protocol / Kademlia / Distributed hash table / Command and control / Peer-to-peer

Towards Complete Node Enumeration in a Peer-to-Peer Botnet Brent ByungHoon Kang1 , Eric Chan-Tin2 , Christopher P. Lee3 , James Tyra2 , Hun Jeong Kang2 , Chris Nunnery1 , Zachariah Wadler1 , Greg Sinclair1 , Nicholas Hop

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2011-08-15 19:32:40
45Spamming / Email spam / Anti-spam techniques / MessageLabs / Email / Internet security / Botnet / Bagle / Antivirus software / Phishing / Computer virus / Storm botnet

Be certain MessageLabs Intelligence: October 2006 “Do you want spam with that spam?” Introduction

Add to Reading List

Source URL: londonactionplan.org

Language: English - Date: 2016-04-26 15:59:23
46Computer network security / Multi-agent systems / Spamming / Aquatic ecology / Fisheries / Algal bloom / Botnet / Great Lakes / Lake / Harmful algal bloom / Harmful Algal Bloom and Hypoxia Research and Control Amendments Act

For a Healthy Great Lakes Ecosystem Share What You See http://glri.wher.org Report sightings of sick/dead birds, algal blooms, and other environmental observations around the Great Lakes

Add to Reading List

Source URL: www.wdin.org

Language: English - Date: 2011-09-23 12:49:50
47Domain name system / Cyberwarfare / Internet Standards / Internet protocols / Internet security / Name server / Cloudmark / Denial-of-service attack / Botnet / Domain Name System Security Extensions / Comparison of DNS server software

Microsoft Word - DNS Whitepaper_Resource Exhaustion_October_2014_v2.docx

Add to Reading List

Source URL: www.cloudmark.com

Language: English - Date: 2014-10-07 15:50:23
48Vaccination / Computer network security / Multi-agent systems / Spamming / Networks / Malware / Computer virus / Botnet / Computer worm / Network science / Immunization / Vaccine

For Good Measure Progress Is Infectious Daniel E. Geer Jr. | In-Q-Tel Daniel B. Larremore | Harvard School of Public Health

Add to Reading List

Source URL: danlarremore.com

Language: English - Date: 2012-12-18 10:08:00
49Domain name system / Cyberwarfare / Malware / Computer network security / Internet protocols / Malware analysis / Botnet / OpenDNS / Name server / Denial-of-service attack / Root name server / Payload

Sandnet: Network Traffic Analysis of Malicious Software Christian Rossow1,2 , Christian J. Dietrich1,3 , Herbert Bos2 , Lorenzo Cavallaro2 , Maarten van Steen2 , Felix C. Freiling3 , Norbert Pohlmann1 1 Institute for In

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-12-21 09:55:27
50Cyberwarfare / Denial-of-service attacks / Computer network security / Internet Relay Chat / Denial-of-service attack / DDoS mitigation / Botnet / Computer security / BlockDos / Draft:Corero Network Security

Whitepaper Industrial Control System Security COVER

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2016-05-16 11:11:13
UPDATE