Botnets

Results: 408



#Item
91Spamming / File sharing networks / Concurrent computing / Botnets / Storm botnet / Peer-to-peer / Kad network / Malware / DoSnet / Multi-agent systems / Computer network security / Computing

Botnet detection revisited: Theory and Practice of Finding Malicious P2P Networks via Internet Connection Graphs Stefan Ruehrup, Pierfrancesco Urbano, Andreas Berger, Alessandro D’Alconzo FTW, Vienna, Austria

Add to Reading List

Source URL: infocom.di.unimi.it

Language: English - Date: 2013-04-29 06:32:55
92Malware / Computing / Crimeware / Botnets / Multi-agent systems / Spamming / Trend Micro / Zeus / Exploit / Computer network security / Cyberwarfare / Computer security

Trend Micro Incorporated Research Paper 2012 The Crimeware Evolution

Add to Reading List

Source URL: www.trendmicro.pl

Language: English - Date: 2013-01-24 20:47:13
93Multi-agent systems / Botnets / Zombie / Email spam / Computer network security / Spamming / Computing

Trapping Botnets by DNS failure graphs: Validation, Extension and Application to a 3G Network Arian Bär, Antonio Paciello, Peter Romirer-Maierhofer Telecommunications Research Center Vienna (FTW) Contact:

Add to Reading List

Source URL: infocom.di.unimi.it

Language: English - Date: 2013-04-23 11:14:52
94Spamming / Botnets / Cyberwarfare / Computer security / FireEye /  Inc. / Denial-of-service attack / BredoLab botnet / Zombie / Waledac botnet / Computer network security / Computing / Multi-agent systems

Harvard Journal of Law & Technology Volume 28, Number 1 Fall 2014 MICROSOFT THE BOTNET HUNTER: THE ROLE OF PUBLIC-PRIVATE PARTNERSHIPS IN MITIGATING BOTNETS

Add to Reading List

Source URL: jolt.law.harvard.edu

Language: English - Date: 2015-04-09 10:45:05
95Spamming / Botnets / Internet Relay Chat / Storm botnet / Peer-to-peer / Internet Relay Chat bot / Fast flux / Denial-of-service attack / Storm Worm / Computing / Computer network security / Multi-agent systems

Discovery techniques for P2P botnets David Dittrich Applied Physics Laboratory University of Washington

Add to Reading List

Source URL: jjcweb.jjay.cuny.edu

Language: English - Date: 2014-12-03 00:00:08
96Computer network security / Multi-agent systems / Electronic commerce / Botnets / Internet bot / Rustock botnet / Denial-of-service attack / Web search query / Click fraud / Computing / Spamming / Internet

SBotMiner: Large Scale Search Bot Detection Fang Yu, Yinglian Xie, and Qifa Ke Microsoft Research Silicon Valley Mountain View, CAUSA fangyu,yxie,

Add to Reading List

Source URL: www.wsdm-conference.org

Language: English - Date: 2009-12-30 02:07:56
97Multi-agent systems / Botnets / Internet / Rustock botnet / Email spam / Spam / Mega-D botnet / Cutwail botnet / Deep packet inspection / Computing / Spamming / Computer network security

Emergency Slice and In-Network DPI as application of network virtualization Japan-EU Workshop on Future Internet/New Generation Network Aki Nakao University of Tokyo

Add to Reading List

Source URL: www.prime-pco.com

Language: English - Date: 2012-01-30 05:25:35
98Computer network security / Multi-agent systems / Email / Spam filtering / Email spam / Botnet / Spam / The Spamhaus Project / DNSBL / Spamming / Computing / Internet

Spamming Botnets: Signatures and Characteristics Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Geoff Hulten+ , Ivan Osipkov+ Microsoft Research, Silicon Valley + Microsoft Corporation

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2008-10-21 14:44:49
99Spamming / Cyberwarfare / Botnets / Denial-of-service attacks / Denial-of-service attack / Fast flux / Storm Worm / Agobot / Internet Relay Chat / Computer network security / Computing / Multi-agent systems

Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods Elizabeth Stinson Stanford University John C. Mitchell

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2010-03-09 22:02:42
100Multi-agent systems / Botnets / Domain name system / Storm botnet / Fast flux / Server / Computer network security / Spamming / Computing

Geolocalization of Proxied Services and its Application to Fast-Flux Hidden Servers Claude Castelluccia, Mohamed Ali Kaafar, Pere Manils, Daniele Perito INRIA Rhone-Alpes Grenoble – France

Add to Reading List

Source URL: planete.inrialpes.fr

Language: English - Date: 2010-04-16 08:57:42
UPDATE