Botnet

Results: 929



#Item
701Computer network security / Malware / Network address translation / Private network / IP address / Code Red / Botnet / Witty / Computer worms / System software / Network architecture / Computing

On the Impact of Dynamic Addressing on Malware Propagation Moheeb Abu Rajab Fabian Monrose Andreas Terzis Computer Science Department Johns Hopkins University {moheeb,fabian,terzis}@cs.jhu.edu

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:43
702Social media / Web 2.0 / Facebook / Real-time web / Spamming / Malware / Anomaly detection / Social networking service / Botnet / Software / Computing / World Wide Web

Towards Detecting Anomalous User Behavior in Online Social Networks Bimal Viswanath MPI-SWS Krishna P. Gummadi MPI-SWS

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2014-07-14 14:05:51
703Computer network security / Scareware / Social engineering / Spyware / Rogue security software / Antivirus software / Computer virus / Botnet / ContraVirus / Malware / System software / Rogue software

September 2010 Fake AV Software

Add to Reading List

Source URL: www.esrmo.scio.nc.gov

Language: English - Date: 2010-12-14 15:49:18
704Denial-of-service attacks / Cyberwarfare / Multi-agent systems / Computer security / Botnet / Denial-of-service attack / Malware / IP address spoofing / Honeypot / Computer network security / Computing / Spamming

Aachen Department of Computer Science Technical Report Botnet Tracking: Exploring a Root-Cause Methodology to Prevent

Add to Reading List

Source URL: sunsite.informatik.rwth-aachen.de

Language: English - Date: 2006-04-03 08:20:52
705Spamming / Cyberwarfare / Denial-of-service attacks / Botnets / Internet Relay Chat bot / Internet Relay Chat / IRCd / Zombie / Malware / Computer network security / Computing / Multi-agent systems

A Multifaceted Approach to Understanding the Botnet Phenomenon Moheeb Abu Rajab Jay Zarfoss Fabian Monrose Computer Science Department

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:43
706Denial-of-service attack / Botnet / Web application security / Application security / Storm botnet / Application firewall / Computer network security / Computing / Cyberwarfare

Integrated Security in the Real World Presenter: Sam Pickles, CTO Aura Information Security

Add to Reading List

Source URL: www.aurainfosec.com

Language: English - Date: 2014-05-22 20:39:00
707Computing / Spamming / Crime prevention / National security / Computer security / Malware / Information security / Internet security / Botnet / Computer network security / Security / Cybercrime

WHAT CAN YOU DO? It’s important that we each understand the risks as well as the actions we can take to help protect our information and systems. •

Add to Reading List

Source URL: cybersecurity.alabama.gov

Language: English - Date: 2012-04-10 15:15:50
708Computer network security / System software / Malware / Spamming / Advanced persistent threat / Botnet / Ghost Rat / GhostNet / SecurID / Espionage / Cyberwarfare / Spyware

Detecting APT Activity with Network Traffic Analysis

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2012-10-24 22:35:52
709Computer network security / Multi-agent systems / Spamming / Malware / Botnet / Adware / Opera / Trend Micro / Software / Computing / Antivirus software

A Trend Micro Research Paper On the Actors Behind MEVADE/SEFNIT Forward-Looking Threat Research Team

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2014-07-07 15:51:43
710Cyberwarfare / Multi-agent systems / Spamming / Computer crimes / Cyberterrorism / Botnet / Storm botnet / Malware / Computer security / Computer network security / Computing / Cybercrime

Order Code RL32114 Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Updated November 15, 2007

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2008-02-21 17:12:28
UPDATE