Botnet

Results: 929



#Item
651Computing / Malware / Computer crimes / Spamming / Phishing / Rootkit / Botnet / Vulnerability / Trojan horse / Cyberwarfare / Computer security / Computer network security

Cyber Reference Aid The purpose of this Cyber Reference Aid is to illustrate the various phases of an attack and to define some of the more common cyber threat terms. Cyber Attack Cycle Testing and Compromise - Prior to

Add to Reading List

Source URL: www.tennessee.gov

Language: English - Date: 2013-10-09 14:04:37
652Computing / Malware / Spamming / Denial-of-service attack / Botnet / Fast flux / Threat / Zero-day attack / Evasion / Computer network security / Cyberwarfare / Computer security

Command & Control Understanding, Denying and Detecting Joseph Gardiner Marco Cova Shishir Nagaraja February 2014

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2014-08-07 05:51:59
653Spamming / Botnets / Concurrent computing / File sharing networks / Peer-to-peer / Storm botnet / Storm Worm / Connectivity / Topology / Multi-agent systems / Computing / Computer network security

2010 ACSAC Proceedings - Papers

Add to Reading List

Source URL: www.cs.stevens.edu

Language: English - Date: 2010-12-06 13:54:48
654IP traceback / Denial-of-service attack / Botnet / Ingress filtering / Spoofing attack / Computer network security / Computing / IP address spoofing

IP Spoofer Project Observations on four-years of data Rob Beverly, Arthur Berger, Young Hyun {rbeverly,awberger}@csail.mit, youngh@caida ISMA AIMS 2009

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2014-09-29 22:51:25
655Multi-agent systems / Internet / Botnets / Spam / Denial-of-service attack / Email spam / Storm botnet / Rustock botnet / Computing / Spamming / Computer network security

Simulation, Analysis, and Visualization Abel Sanchez & John Williams Papers Background

Add to Reading List

Source URL: cyberexpo.memphis.edu

Language: English - Date: 2014-06-02 16:51:48
656Computer network security / Cybercrime / Email / Computer crimes / MAAWG / Email spam / Spam / Botnet / Malware / Computing / Internet / Spamming

From: Messaging Anti-Abuse Working Group (MAAWG) Date: September 17th, 2010 Subject: Comments on "National Broadband Plan Recommendation to Create a Cybersecurity Roadmap Thank you for the opportunity to submit comments

Add to Reading List

Source URL: www.maawg.org

Language: English
657Cyberwarfare / Denial-of-service attack / Stefan Savage / Computer worm / Warhol worm / Botnet / Internet security / Tor / Firewall / Computer network security / Computing / System software

Report on DIMACS∗ Workshop on Large-scale Internet Attacks Date of workshop: September 23 – 24, 2003 Workshop Organizers: Vern Paxson, ICSI Center for Internet Research Steve Bellovin, AT&T Labs-Research

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2004-02-19 13:06:20
658Spamming / Cyberwarfare / Botnets / Denial-of-service attacks / Storm botnet / Denial-of-service attack / Peer-to-peer / Malware / ANts P2P / Computer network security / Computing / Multi-agent systems

P2P as botnet command and control: a deeper insight David Dittrich Applied Physics Laboratory University of Washington [removed]

Add to Reading List

Source URL: staff.washington.edu

Language: English - Date: 2008-10-10 19:28:45
659The Spamhaus Project / Anti-spam techniques / Email spam / Phishing / Spam / OpenDNS / Botnet / Blacklist / SURBL / Spamming / Internet / Computing

Malicious Hubs: Detecting Abnormally Malicious Autonomous Systems Andrew J. Kalafut Craig A. Shue

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2010-02-11 15:35:28
660Cybercrime / Security / Multi-agent systems / Spamming / Organized crime / Identity theft / Botnet / Computer security / Malware / Crime / Computer crimes / Computer network security

technology_data_background_2

Add to Reading List

Source URL: www.grc.gc.ca

Language: English - Date: 2014-06-02 11:27:37
UPDATE