Botnet

Results: 929



#Item
61Computer network security / Multi-agent systems / Spamming / Botnets / Cyberwarfare / Command and control / Denial-of-service attack / ZeroAccess botnet / Communications protocol / NetFlow / Kelihos botnet / Transmission Control Protocol

CoCoSpot: Clustering and Recognizing Botnet Command and Control Channels using Traffic Analysis1 Christian J. Dietricha,c , Christian Rossowa,b , Norbert Pohlmanna a Institute for Internet Security, University of Applie

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:17:15
62Cyberwarfare / Computer network security / Spamming / Cybercrime / Multi-agent systems / Ransomware / Computer security / Malware / Denial-of-service attack / Botnet / Search warrant / Phishing

Comments on Proposed Remote Search Rules Steven M. Bellovin Columbia University∗ Matt Blaze University of Pennsylvania*

Add to Reading List

Source URL: www.privacyink.org

Language: English - Date: 2015-10-13 22:14:45
63Cyberwarfare / Computer network security / Denial-of-service attacks / Cybercrime / National security / Computer security / Denial-of-service attack / Cyber-attack / Botnet / Prolexic Technologies

Corero Network Security plc Corero Network Security plc 169 High Street Rickmansworth Hertfordshire WD3 1AY

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2013-03-28 13:42:59
64Internet Standards / Internet protocols / Internet security / Tor / Dark web / Bipartite graph / Botnet / Internet privacy / Ricochet

HOnions: Towards Detection and Identification of Misbehaving Tor HSDirs Amirali Sanatinia Guevara Noubir

Add to Reading List

Source URL: kryptera.se

Language: English - Date: 2016-07-26 09:57:57
65Mobile Malware / Mobile security / Malware / DroidKungFu / Android / Botnet / GingerMaster / Google Play / Norton / Computer virus / Lookout / Antivirus software

Dissecting Android Malware: Characterization and Evolution Yajin Zhou Department of Computer Science North Carolina State University yajin

Add to Reading List

Source URL: yajin.org

Language: English
66Cyberwarfare / Denial-of-service attacks / Computer network security / Internet Relay Chat / Cybercrime / DDoS mitigation / Denial-of-service attack / Botnet / Computer security

T HESIS FOR THE D EGREE OF DOCTOR OF PHILOSOPHY Multifaceted Defense Against Distributed Denial of Service Attacks: Prevention, Detection, Mitigation

Add to Reading List

Source URL: www.cse.chalmers.se

Language: English - Date: 2012-08-22 04:55:54
67Cyberwarfare / Computer network security / Peer-to-peer / Botnet / Hosts / Denial-of-service attack / Public-key cryptography / Computer security / Fabric of Security

Towards Attack-Agnostic Defenses David Brumley and Dawn Song Carnegie Mellon University {dbrumley,dawnsong}@cs.cmu.edu Abstract

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
68Computer network security / Multi-agent systems / Spamming / Botnets / United States v. Nosal / Computer Fraud and Abuse Act / Zombie / Computer worm / Mariposa botnet / Conficker / Rustock botnet / Srizbi botnet

Testimony of Amie Stepanovich  Senior Policy Counsel, Access  on behalf of   Access and the Electronic Frontier Foundation  Before the Advisory Committee on Criminal Rules  on the Matter of P

Add to Reading List

Source URL: www.accessnow.org

Language: English - Date: 2015-09-14 16:04:23
69Spamming / Email spam / Anti-spam techniques / Srizbi botnet / Spambot / Botnet / SpamAssassin / Email filtering / Spam / Storm botnet / Image spam / Spam Reader

Botnet Judo: Fighting Spam with Itself Andreas Pitsillidis∗ Kirill Levchenko∗ Geoffrey M. Voelker∗

Add to Reading List

Source URL: www.dcg.ethz.ch

Language: English - Date: 2014-09-26 08:28:56
70

IDC Herzliya Efi Arazi School of Computer Science MSc in Computer Science Kuluoz: Malware and botnet analysis

Add to Reading List

Source URL: portal.idc.ac.il

Language: English - Date: 2013-11-21 04:26:41
    UPDATE