Botnets

Results: 408



#Item
21Beyond Text Performances, Sounds, Images, Objects Beyond Text Before and After Professor Evelyn Welch

Beyond Text Performances, Sounds, Images, Objects Beyond Text Before and After Professor Evelyn Welch

Add to Reading List

Source URL: www.beyondtext.ac.uk

Language: English - Date: 2012-04-18 04:41:09
22Congestion Attacks to Autonomous Cars Using Vehicular Botnets Mevlut Turker Garip, Mehmet Emre Gursoy, Peter Reiher, Mario Gerla Department of Computer Science, University of California Los Angeles {mtgarip, memregursoy,

Congestion Attacks to Autonomous Cars Using Vehicular Botnets Mevlut Turker Garip, Mehmet Emre Gursoy, Peter Reiher, Mario Gerla Department of Computer Science, University of California Los Angeles {mtgarip, memregursoy,

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2015-06-09 13:27:55
23On Botnets that use DNS for Command and Control Christian J. Dietrich‡∗ , Christian Rossow†∗ , Felix C. Freiling‡ , Norbert Pohlmann∗ †Computer Systems Group, Vrije Universiteit Amsterdam ‡Department of C

On Botnets that use DNS for Command and Control Christian J. Dietrich‡∗ , Christian Rossow†∗ , Felix C. Freiling‡ , Norbert Pohlmann∗ †Computer Systems Group, Vrije Universiteit Amsterdam ‡Department of C

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:20:24
24Be certain  MessageLabs Intelligence: April 2006 Catch Me If You Can: A Review of QuarterIntroduction Welcome to the April edition of the MessageLabs Intelligence monthly report. This report provides the latest t

Be certain MessageLabs Intelligence: April 2006 Catch Me If You Can: A Review of QuarterIntroduction Welcome to the April edition of the MessageLabs Intelligence monthly report. This report provides the latest t

Add to Reading List

Source URL: londonactionplan.org

Language: English - Date: 2016-04-26 15:59:20
25September 2015 Feature Article: Watching the Furby Fly Table of Contents Watching the Furby Fly............................................................................................................................

September 2015 Feature Article: Watching the Furby Fly Table of Contents Watching the Furby Fly............................................................................................................................

Add to Reading List

Source URL: www.virusradar.com

Language: English - Date: 2015-10-06 04:42:51
26CoCoSpot: Clustering and Recognizing Botnet Command and Control Channels using Traffic Analysis1 Christian J. Dietricha,c , Christian Rossowa,b , Norbert Pohlmanna a Institute  for Internet Security, University of Applie

CoCoSpot: Clustering and Recognizing Botnet Command and Control Channels using Traffic Analysis1 Christian J. Dietricha,c , Christian Rossowa,b , Norbert Pohlmanna a Institute for Internet Security, University of Applie

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:17:15
27September 2015 Feature Article: Watching the Furby Fly Table of Contents Watching the Furby Fly............................................................................................................................

September 2015 Feature Article: Watching the Furby Fly Table of Contents Watching the Furby Fly............................................................................................................................

Add to Reading List

Source URL: virusradar.com

Language: English - Date: 2015-10-06 04:42:51
28Testimony of Amie Stepanovich  Senior Policy Counsel, Access  on behalf of   Access and the Electronic Frontier Foundation  Before the Advisory Committee on Criminal Rules  on the Matter of P

Testimony of Amie Stepanovich  Senior Policy Counsel, Access  on behalf of   Access and the Electronic Frontier Foundation  Before the Advisory Committee on Criminal Rules  on the Matter of P

Add to Reading List

Source URL: www.accessnow.org

Language: English - Date: 2015-09-14 16:04:23
29Solution Brief  Using Inside-the-Network Threat Detection to Stop the Ever Increasing Threat of Advanced Malware Attacks Today’s corporations are facing an onslaught of cyberattacks. Botnets (BOTs) and advanced

Solution Brief Using Inside-the-Network Threat Detection to Stop the Ever Increasing Threat of Advanced Malware Attacks Today’s corporations are facing an onslaught of cyberattacks. Botnets (BOTs) and advanced

Add to Reading List

Source URL: attivonetworks.com

Language: English - Date: 2015-09-02 19:26:42
    30Dumbots: Unexpected Botnets through Networked Embedded Devices Kwang-Hyun Baek, Sergey Bratus, Sara Sinclair, Sean W. Smith Dartmouth College Computer Science Technical Report TR2007-591 May 26, 2007

    Dumbots: Unexpected Botnets through Networked Embedded Devices Kwang-Hyun Baek, Sergey Bratus, Sara Sinclair, Sean W. Smith Dartmouth College Computer Science Technical Report TR2007-591 May 26, 2007

    Add to Reading List

    Source URL: www.ists.dartmouth.edu

    Language: English - Date: 2008-09-11 13:40:20