Botnets

Results: 408



#Item
21Computing / Multi-agent systems / Spamming / Computer network security / Concurrent computing / Botnets / Storm botnet / Educational technology

Beyond Text Performances, Sounds, Images, Objects Beyond Text Before and After Professor Evelyn Welch

Add to Reading List

Source URL: www.beyondtext.ac.uk

Language: English - Date: 2012-04-18 04:41:09
22Transport / Land transport / Road traffic management / Road transport / Wireless networking / Emerging technologies / Vehicle telematics / Vehicular communication systems / Traffic congestion / Vehicular ad hoc network / Botnet / Vehicle-to-vehicle

Congestion Attacks to Autonomous Cars Using Vehicular Botnets Mevlut Turker Garip, Mehmet Emre Gursoy, Peter Reiher, Mario Gerla Department of Computer Science, University of California Los Angeles {mtgarip, memregursoy,

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2015-06-09 13:27:55
23Spamming / Computer network security / Multi-agent systems / Domain name system / Botnets / Command and control / Rustock botnet / Name server / Email spam / OpenDNS / DNS sinkhole

On Botnets that use DNS for Command and Control Christian J. Dietrich‡∗ , Christian Rossow†∗ , Felix C. Freiling‡ , Norbert Pohlmann∗ †Computer Systems Group, Vrije Universiteit Amsterdam ‡Department of C

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:20:24
24Spamming / Computer network security / Multi-agent systems / Botnets / Cybercrime / Email spam / Phishing / Computer worm / The Spamhaus Project / Anti-spam techniques / Zombie / Bagle

Be certain MessageLabs Intelligence: April 2006 Catch Me If You Can: A Review of QuarterIntroduction Welcome to the April edition of the MessageLabs Intelligence monthly report. This report provides the latest t

Add to Reading List

Source URL: londonactionplan.org

Language: English - Date: 2016-04-26 15:59:20
25ESET / Botnets / Computer network security / Multi-agent systems / Spamming / Sality / AutoRun / Antivirus software / David Harley / Computer virus / Malware / Furby

September 2015 Feature Article: Watching the Furby Fly Table of Contents Watching the Furby Fly............................................................................................................................

Add to Reading List

Source URL: www.virusradar.com

Language: English - Date: 2015-10-06 04:42:51
26Computer network security / Multi-agent systems / Spamming / Botnets / Cyberwarfare / Command and control / Denial-of-service attack / ZeroAccess botnet / Communications protocol / NetFlow / Kelihos botnet / Transmission Control Protocol

CoCoSpot: Clustering and Recognizing Botnet Command and Control Channels using Traffic Analysis1 Christian J. Dietricha,c , Christian Rossowa,b , Norbert Pohlmanna a Institute for Internet Security, University of Applie

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:17:15
27ESET / Botnets / Computer network security / Multi-agent systems / Spamming / Sality / AutoRun / Antivirus software / David Harley / Computer virus / Malware / Furby

September 2015 Feature Article: Watching the Furby Fly Table of Contents Watching the Furby Fly............................................................................................................................

Add to Reading List

Source URL: virusradar.com

Language: English - Date: 2015-10-06 04:42:51
28Computer network security / Multi-agent systems / Spamming / Botnets / United States v. Nosal / Computer Fraud and Abuse Act / Zombie / Computer worm / Mariposa botnet / Conficker / Rustock botnet / Srizbi botnet

Testimony of Amie Stepanovich  Senior Policy Counsel, Access  on behalf of   Access and the Electronic Frontier Foundation  Before the Advisory Committee on Criminal Rules  on the Matter of P

Add to Reading List

Source URL: www.accessnow.org

Language: English - Date: 2015-09-14 16:04:23
29

Solution Brief Using Inside-the-Network Threat Detection to Stop the Ever Increasing Threat of Advanced Malware Attacks Today’s corporations are facing an onslaught of cyberattacks. Botnets (BOTs) and advanced

Add to Reading List

Source URL: attivonetworks.com

Language: English - Date: 2015-09-02 19:26:42
    30

    Dumbots: Unexpected Botnets through Networked Embedded Devices Kwang-Hyun Baek, Sergey Bratus, Sara Sinclair, Sean W. Smith Dartmouth College Computer Science Technical Report TR2007-591 May 26, 2007

    Add to Reading List

    Source URL: www.ists.dartmouth.edu

    Language: English - Date: 2008-09-11 13:40:20
      UPDATE