Botnet

Results: 929



#Item
671Security / Spamming / Hacking / Malware / Botnet / Denial-of-service attack / Zero-day attack / Threat / Antivirus software / Cyberwarfare / Computer network security / Computer security

Command & Control Understanding, Denying and Detecting Joseph Gardiner Marco Cova Shishir Nagaraja February 2014

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2014-06-10 10:29:41
672Computing / Malware / Electronic voting / DNS spoofing / Denial-of-service attack / Computer worm / Computer virus / Exploit / Botnet / Computer network security / Cyberwarfare / Computer security

Security Considerations for Remote Electronic Voting over the Internet Avi Rubin AT&T Labs – Research Florham Park, NJ [removed]

Add to Reading List

Source URL: www.electioncenter.org

Language: English - Date: 2007-03-13 00:00:00
673Antivirus software / Computing / Cyberwarfare / Computer security / Computer network security / Malware / Botnet

TRAINING DATA The goal of the detection algorithms is to use training data in order to efficiently tell whether a given set of intercepted communication data contains messages to or from a target C2 network.

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2014-04-14 06:44:40
674Computing / Crime / Malware / Electronic warfare / Hacking / Computer security / Botnet / Internet privacy / McAfee / Computer network security / Computer crimes / Security

Monthly Security Tips NEWSLETTER January[removed]Volume 6, Issue 1

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2011-01-25 19:14:02
675Malware / Computing / Rootkit / Botnet / Fast flux / Computer virus / Antivirus software / Cyberwarfare / Computer security

Prudent Practices for Designing Malware Experiments: Status Quo and Outlook Christian Rossow∗‡ , Christian J. Dietrich∗ , Chris Grier†§ , Christian Kreibich†§ , Vern Paxson†§ , Norbert Pohlmann∗ , Herber

Add to Reading List

Source URL: www.christian-rossow.de

Language: English - Date: 2012-03-17 04:52:06
676Multi-agent systems / Internet / Domain name system / Botnet / Spam filtering / Malware / Dynamic DNS / DNSBL / Spamming / Computer network security / Computing

Internet Monitoring via DNS Traffic Analysis Wenke Lee Georgia Institute of Technology 0

Add to Reading List

Source URL: www.cyber.umd.edu

Language: English - Date: 2012-11-19 10:50:45
677Software / McAfee / Multi-agent systems / Spamming / Malware / Botnet / Bitcoin / Web threat / Rootkit / Computing / Computer network security / Cyberwarfare

McAfee Labs Threats Report June 2014 Report McAfee Labs Threats Report | June 2014

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-08-08 11:30:03
678Multi-agent systems / Cyberwarfare / Spamming / Computer security / Denial-of-service attack / Internet Relay Chat / Botnet / Load balancing / Transmission Control Protocol / Computer network security / Computing / Denial-of-service attacks

On Measuring the Impact of DDoS Botnets Arne Welzel Christian Rossow Herbert Bos

Add to Reading List

Source URL: www.christian-rossow.de

Language: English - Date: 2014-03-31 07:00:45
679Computer security / Internet / Blacklist / Computer jargon / Malware / Domain name / Network architecture / Botnet / Spamming / Computing / Domain name system

Paint it Black: Evaluating the Effectiveness of Malware Blacklists Marc K¨ uhrer, Christian Rossow, and Thorsten Holz Horst G¨ ortz Institute for IT-Security, Ruhr-University Bochum, Germany

Add to Reading List

Source URL: www.christian-rossow.de

Language: English - Date: 2014-07-21 05:15:13
680Spamming / Botnets / Malware / Internet Relay Chat bot / Bagle / Video game bot / Zeus / Storm Worm / Lethic botnet / Computing / Computer network security / Multi-agent systems

White Paper The New Era of Botnets By Zheng Bu, Pedro Bueno, Rahul Kashyap, and Adam Wosotowsky McAfee Labs™

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:08:16
UPDATE