<--- Back to Details
First PageDocument Content
Email / Computer-mediated communication / Email spam / Spam / MAAWG / Botnet / Computer virus / Anti-spam techniques / Email address harvesting / Spamming / Internet / Computing
Date: 2015-03-08 11:14:30
Email
Computer-mediated communication
Email spam
Spam
MAAWG
Botnet
Computer virus
Anti-spam techniques
Email address harvesting
Spamming
Internet
Computing

2010_MAAWG-Consumer_Survey

Add to Reading List

Source URL: www.m3aawg.org

Download Document from Source Website

File Size: 3,13 MB

Share Document on Facebook

Similar Documents

Computer network security / Computing / Security engineering / Computer security / Cyberwarfare / Cybercrime / Spamming / Multi-agent systems / Botnet / Complex event processing / Zeek / Blacklist

POSTER: BotFlex: A Community-driven Tool for Botnet Detection Sheharbano Khattak Independent Researcher

DocID: 1xW2K - View Document

Botnets / Cybercrime / Computing / Cyberwarfare / Torpig / Srizbi botnet / Festi / Fast flux / Domain generation algorithm / Bot herder / The Spamhaus Project / Conficker

Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna University of California

DocID: 1xVzK - View Document

Computer network security / Computing / Cyberwarfare / Multi-agent systems / Spamming / Cybercrime / Botnet / Influence diagram / Bayesian network / Computer security

Poster: Bottleneck: A Generalized, Flexible, and Extensible Framework for Botnet Defense Naurin Rasheed Ramay∗ , Sheharbano Khattak† , Affan A. Syed‡ Syed Ali Khayam§

DocID: 1xUUW - View Document

Botnets / Cybercrime / Computing / Cyberwarfare / Denial-of-service attacks / Linux malware / Computer network security / Mirai / BASHLITE / Internet of things / TR-069 / Denial-of-service attack

Understanding the Mirai Botnet Manos Antonakakis⇧ Tim April‡ Michael Bailey† Matthew Bernhard/ Elie Bursztein Jaime Cochran. Zakir Durumeric/ J. Alex Halderman/ Luca Invernizzi Michalis Kallitsis§ Deepak Kumar†

DocID: 1xUSE - View Document

Concurrent computing / Computer network security / Multi-agent systems / Spamming / Computing / Cybercrime / Distributed computing / Malware / Botnet / Peer-to-peer / Social peer-to-peer processes

Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2 Institute of Information Engineering, Chinese Academy of Sciences

DocID: 1xUGX - View Document