Botnet

Results: 929



#Item
61CoCoSpot: Clustering and Recognizing Botnet Command and Control Channels using Traffic Analysis1 Christian J. Dietricha,c , Christian Rossowa,b , Norbert Pohlmanna a Institute  for Internet Security, University of Applie

CoCoSpot: Clustering and Recognizing Botnet Command and Control Channels using Traffic Analysis1 Christian J. Dietricha,c , Christian Rossowa,b , Norbert Pohlmanna a Institute for Internet Security, University of Applie

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:17:15
62Comments on Proposed Remote Search Rules Steven M. Bellovin Columbia University∗ Matt Blaze University of Pennsylvania*

Comments on Proposed Remote Search Rules Steven M. Bellovin Columbia University∗ Matt Blaze University of Pennsylvania*

Add to Reading List

Source URL: www.privacyink.org

Language: English - Date: 2015-10-13 22:14:45
63Corero Network Security plc  Corero Network Security plc 169 High Street Rickmansworth Hertfordshire WD3 1AY

Corero Network Security plc Corero Network Security plc 169 High Street Rickmansworth Hertfordshire WD3 1AY

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2013-03-28 13:42:59
64HOnions: Towards Detection and Identification of Misbehaving Tor HSDirs Amirali Sanatinia Guevara Noubir

HOnions: Towards Detection and Identification of Misbehaving Tor HSDirs Amirali Sanatinia Guevara Noubir

Add to Reading List

Source URL: kryptera.se

Language: English - Date: 2016-07-26 09:57:57
65Dissecting Android Malware: Characterization and Evolution Yajin Zhou Department of Computer Science North Carolina State University yajin

Dissecting Android Malware: Characterization and Evolution Yajin Zhou Department of Computer Science North Carolina State University yajin

Add to Reading List

Source URL: yajin.org

Language: English
66T HESIS FOR THE D EGREE OF DOCTOR OF PHILOSOPHY  Multifaceted Defense Against Distributed Denial of Service Attacks: Prevention, Detection, Mitigation

T HESIS FOR THE D EGREE OF DOCTOR OF PHILOSOPHY Multifaceted Defense Against Distributed Denial of Service Attacks: Prevention, Detection, Mitigation

Add to Reading List

Source URL: www.cse.chalmers.se

Language: English - Date: 2012-08-22 04:55:54
67Towards Attack-Agnostic Defenses David Brumley and Dawn Song Carnegie Mellon University {dbrumley,dawnsong}@cs.cmu.edu  Abstract

Towards Attack-Agnostic Defenses David Brumley and Dawn Song Carnegie Mellon University {dbrumley,dawnsong}@cs.cmu.edu Abstract

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
68Testimony of Amie Stepanovich  Senior Policy Counsel, Access  on behalf of   Access and the Electronic Frontier Foundation  Before the Advisory Committee on Criminal Rules  on the Matter of P

Testimony of Amie Stepanovich  Senior Policy Counsel, Access  on behalf of   Access and the Electronic Frontier Foundation  Before the Advisory Committee on Criminal Rules  on the Matter of P

Add to Reading List

Source URL: www.accessnow.org

Language: English - Date: 2015-09-14 16:04:23
69Botnet Judo: Fighting Spam with Itself Andreas Pitsillidis∗ Kirill Levchenko∗  Geoffrey M. Voelker∗

Botnet Judo: Fighting Spam with Itself Andreas Pitsillidis∗ Kirill Levchenko∗ Geoffrey M. Voelker∗

Add to Reading List

Source URL: www.dcg.ethz.ch

Language: English - Date: 2014-09-26 08:28:56
70IDC Herzliya Efi Arazi School of Computer Science MSc in Computer Science Kuluoz: Malware and botnet analysis

IDC Herzliya Efi Arazi School of Computer Science MSc in Computer Science Kuluoz: Malware and botnet analysis

Add to Reading List

Source URL: portal.idc.ac.il

Language: English - Date: 2013-11-21 04:26:41