Botnet

Results: 929



#Item
691Security / Spamming / Computing / Crime prevention / National security / Computer security / Malware / Internet security / Botnet / Computer network security / Cybercrime / Computer crimes

Microsoft Word - October 2010 Why Cyber Security is Important.docx

Add to Reading List

Source URL: www.esrmo.scio.nc.gov

Language: English - Date: 2010-12-14 15:49:09
692Anti-spam techniques / Spam / Email spam / Botnet / Storm botnet / Email filtering / Email / Spam email delivery / Srizbi botnet / Spamming / Computing / Internet

Spamalytics: An Empirical Analysis of Spam Marketing Conversion

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2009-09-09 15:43:01
693Internet / Spamming / Electronic commerce / Secure communication / Internet ethics / Identity theft / Botnet / Email spam / Malware / Computer network security / Computing / Security

The following are major trends within information security and some of their implications for state government

Add to Reading List

Source URL: www.oregon.gov

Language: English - Date: 2012-02-28 20:42:58
694Computer security / Malware / Botnet / Internet security / Spyware / Computer worm / Attack / Rogue security software / Cloud computing / Computer network security / Cyberwarfare / Computing

Microsoft Word - January[removed]Cyber Security Trends.docx

Add to Reading List

Source URL: www.esrmo.scio.nc.gov

Language: English - Date: 2010-02-26 07:44:00
695Cyberwarfare / Botnet / Twitter / Password / Identity theft / Social engineering / Hacker / Smartphone / Denial-of-service attack / Computer network security / Computing / Security

The following are major trends within information security and some of their implications for state government

Add to Reading List

Source URL: www.oregon.gov

Language: English - Date: 2012-02-28 20:43:11
696Internet / Malware / Peer-to-peer / Botnet / Trojan horse / Denial-of-service attack / Attack / Phishing / Computer security / Computer network security / Computing / Cyberwarfare

Reference 30 UNIVERSITY OF ALASKA IT Update - Security Malware Detection and Prevention

Add to Reading List

Source URL: info.alaska.edu

Language: English - Date: 2013-04-03 13:55:01
697Computing / Botnets / Malware / Storm botnet / Computer network security / Multi-agent systems / Spamming

A Scalable Architecture for Persistent Botnet Tracking by Jay Zarfoss

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:48
698Computer security / Cyberwarfare / Honeypot / Malware / Botnet / Vulnerability / World Wide Web / Medoid / Tf*idf / Computer network security / Spamming / Computing

To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads Sam Small Johns Hopkins University Joshua Mason

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:51
699Computing / Cyberwarfare / Secure communication / Multi-agent systems / Spamming / Electronic medical record / Electronic health record / Botnet / Internet privacy / Computer network security / Health informatics / Security

The following are major trends within information security and some of their implications for state government

Add to Reading List

Source URL: www.oregon.gov

Language: English - Date: 2012-02-28 20:43:03
700Network architecture / Computer network security / Spamming / Internet protocols / Multi-agent systems / Botnet / Conficker / DNS spoofing / NX technology / Computing / Internet / Domain name system

Crossing the Threshold: Detecting Network Malfeasance via Sequential Hypothesis Testing Srinivas Krishnan, Teryl Taylor, Fabian Monrose John McHugh

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2013-05-27 15:45:47
UPDATE