Botnet

Results: 929



#Item
881Computer security / Computing / Denial-of-service attack / Trinoo / Smurf attack / UDP flood attack / SYN flood / Internet Relay Chat flood / Botnet / Denial-of-service attacks / Computer network security / Cyberwarfare

Denial of Service Attacks Qijun Gu, PhD. Assistant Professor

Add to Reading List

Source URL: s2.ist.psu.edu

Language: English - Date: 2008-02-21 16:49:08
882Multi-agent systems / Computer security / Spamming / Denial-of-service attacks / Botnet / Malware / Denial-of-service attack / Rootkit / Transmission Control Protocol / Computer network security / Computing / Cyberwarfare

Festi  botnet  analysis  and  investigation   Aleksandr  Matrosov,  Eugene  Rodionov   Keywords: Festi, spam, botnet, rootkit, DDoS, OOP, HIPS, firewall

Add to Reading List

Source URL: www.eset.com

Language: English - Date: 2012-11-27 10:18:00
883Technology / Malware / Phishing / Anti-spam techniques / Spam / Botnet / Transaction authentication number / Classifier / CAPTCHA / Spamming / Computing / Internet

Facebook Immune System Tao Stein

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2011-03-31 17:41:56
884Computer network security / Botnet / Spam / Anti-spam techniques / AOL / Email spam / Zombie / Malware / The Spamhaus Project / Computing / Spamming / Internet

NEWS BRIEFS Researchers

Add to Reading List

Source URL: www.computer.org

Language: English - Date: 2006-03-30 19:52:55
885Multi-agent systems / Spamming / University of Toronto / Internet censorship / Psiphon / Botnet / Twitter / Syria / Free Syrian Army / Asia / Computing / Computer network security

SYRIA CYBER WATCH NOV. 25, 2012

Add to Reading List

Source URL: www.lawfareblog.com

Language: English - Date: 2012-11-30 15:57:08
886Cyberwarfare / Multi-agent systems / Spamming / Computer crimes / Cyberterrorism / Botnet / Storm botnet / Malware / Computer security / Computer network security / Computing / Cybercrime

Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress

Add to Reading List

Source URL: www.fas.org

Language: English - Date: 2008-03-05 10:18:17
887Distributed computing / Intellectual property law / Peer-to-peer / Social peer-to-peer processes / File sharing / Botnet / ANts P2P / HTTP / Computing / Concurrent computing / File sharing networks

Peer-to-Peer Systems and Gossip Protocols

Add to Reading List

Source URL: www.inf.u-szeged.hu

Language: English - Date: 2007-07-05 16:51:04
888Computer network security / Spamming / Botnets / Debugging / Disassembler / OllyDbg / Pointer / Mariposa botnet / Portable Executable / Computing / Computer programming / Multi-agent systems

Mariposa Botnet Analysis Defence Intelligence Thursday October 8th, 2009

Add to Reading List

Source URL: www.defintel.com

Language: English - Date: 2011-06-14 15:31:49
889File sharing networks / Spamming / Cyberwarfare / Denial-of-service attacks / Botnet / ANts P2P / Peer-to-peer / Transmission Control Protocol / Denial-of-service attack / Computer network security / Computing / Multi-agent systems

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 9, No. 12, 2011

Add to Reading List

Source URL: eprints2.utem.edu.my

Language: English - Date: 2012-06-15 05:22:02
890Internet / Computer crimes / Social engineering / Computer network security / Malware / Botnet / Phishing / Spam / Zeus / Cybercrime / Computing / Spamming

Report A Good Decade for Cybercrime

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2011-01-24 19:24:27
UPDATE