Botnet

Results: 929



#Item
611Internet / Malware / Peer-to-peer / Botnet / Trojan horse / Denial-of-service attack / Attack / Phishing / Computer security / Computer network security / Computing / Cyberwarfare

Reference 30 UNIVERSITY OF ALASKA IT Update - Security Malware Detection and Prevention

Add to Reading List

Source URL: www.alaska.edu

Language: English - Date: 2013-04-03 13:55:01
612Computer-mediated communication / Anti-spam techniques / Email spam / Botnet / Spam / Email / Open mail relay / Storm botnet / Simple Mail Transfer Protocol / Spamming / Computing / Internet

The Harvester, the Botmaster, and the Spammer: On the Relations Between the Different Actors in the Spam Landscape Gianluca Stringhini, Oliver Hohlfeld† , Christopher Kruegel, and Giovanni Vigna Department of Computer

Add to Reading List

Source URL: cs.ucsb.edu

Language: English - Date: 2014-05-31 17:36:17
613Mobile technology / Computer network security / Multi-agent systems / Email / Botnet / SMS / SYS / Technology / Spamming / Computing

NIST Workshop: Technical Aspects of Botnet Presentation: Anti-Botnet Ecosystem

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2012-06-07 12:31:07
614Spamming / Botnets / Malware / Internet Relay Chat bot / Bagle / Video game bot / Zeus / Storm Worm / Lethic botnet / Computing / Computer network security / Multi-agent systems

White Paper The New Era of Botnets By Zheng Bu, Pedro Bueno, Rahul Kashyap, and Adam Wosotowsky McAfee Labs™

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:08:16
615IBM PC compatibles / Technology / Intel / Computer hardware / Computing

NIST Workshop: Technical Aspects of Botnet Presentation: Botent Detection and Remediation Techniques

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2012-06-07 11:43:07
616Computing / Botnets / Malware / Computer network security / Multi-agent systems / Spamming

NIST Workshop: Technical Aspects of Botnet Presentation: Botent detection, defense, and removal in an always connected world

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2012-06-07 11:40:11
617Spam filtering / Email / Anti-spam / Proofpoint /  Inc. / Computer network security / Anti-spam techniques / Email spam / Botnet / Spam / Computing / Spamming / Internet

Proofpoint Dynamic Reputation High-Performance Connection Management and Email Reputation The Proofpoint Enterprise Protection™ Suite includes the industry’s most powerful connection management features, powered by P

Add to Reading List

Source URL: www.proofpoint.com

Language: English - Date: 2012-07-27 17:16:58
618Computer security / Spamming / Electronic commerce / Computer crimes / Vulnerability / Malware / Zero-day attack / Crimeware / Botnet / Computer network security / Computing / Cyberwarfare

White Paper Cybercrime Exposed Cybercrime-as-a-Service By Raj Samani, Vice President and CTO, EMEA, McAfee

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:07:55
619Computing / Botnets / Malware / Computer network security / Multi-agent systems / Spamming

NIST Workshop: Technical Aspects of Botnet Presentation: Malware Analytics at SRI

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2012-06-07 12:35:04
620Crime / Ethics / Business / Phishing / Social engineering / Spamming

NIST Workshop: Technical Aspects of Botnet Presentation: Infected System (Bot) Metrics (Problems, Needs & Standards)

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2012-06-07 12:36:13
UPDATE