Botnets

Results: 408



#Item
31Computing / Cyberwarfare / Botnets / Computer network security / Multi-agent systems / Spamming / Concurrent computing / Domain generation algorithm / Malware / Sality / Denial-of-service attack / Computer virus

AUTOPROBE: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis Zhaoyan Xu Antonio Nappa

Add to Reading List

Source URL: faculty.cs.tamu.edu

Language: English - Date: 2014-09-29 02:03:52
32

Les botnets et autopsie InfoStealer.Banker (Juin 2007)

Add to Reading List

Source URL: www.xmco.fr

Language: French - Date: 2016-02-23 04:52:18
    33Computing / Spamming / Cyberspace / Computer network security / Botnets / Multi-agent systems / Email / Computer virus / Email spam / Malware / Computer worm / Slenfbot

    The silent network Denying the spam and malware chatter using free tools Peter N. M. Hansteen

    Add to Reading List

    Source URL: home.nuug.no

    Language: English - Date: 2007-05-18 16:29:18
    34

    Malware: Botnets, Viruses, and Worms Damon McCoy Slide Credit: Vitaly Shmatikov slide 1

    Add to Reading List

    Source URL: inst.eecs.berkeley.edu

    Language: English - Date: 2015-02-27 19:58:07
      35

      Ten Hard Questions on Botnets

      Add to Reading List

      Source URL: www.security-finder.ch

      Language: English - Date: 2011-03-29 05:49:08
        36Botnets / Computing / Computer network security / Multi-agent systems / Spamming / Malware / Cyberwarfare / Torpig / Srizbi botnet / Command and control / Festi / Fast flux

        Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna University of California

        Add to Reading List

        Source URL: seclab.cs.ucsb.edu

        Language: English - Date: 2010-12-20 14:49:07
        37Spamming / Computing / Computer network security / Multi-agent systems / Botnets / Concurrent computing / Cyberwarfare / Command and control / Storm botnet / Cluster analysis / Internet bot / Hierarchical clustering

        BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu† , Roberto Perdisci‡ , Junjie Zhang† , and Wenke Lee† † College of Computing, Georgia Institut

        Add to Reading List

        Source URL: faculty.cs.tamu.edu

        Language: English - Date: 2008-05-09 14:43:43
        38Malware / Computing / Cyberwarfare / Statistical classification / Trojan horses / Botnets / Machine learning / Antivirus software / Malware analysis / Support vector machine / Zeus / Computer virus

        Unveiling Zeus Automated Classification of Malware Samples Abedelaziz Mohaisen Omar Alrawi

        Add to Reading List

        Source URL: www2013.wwwconference.org

        Language: English - Date: 2014-07-21 08:47:00
        39

        Botnets Behavioral Patterns in the Network Garcia Sebastian @eldracote Hack.LuCTU University, Czech Republic. UNICEN University, Argentina.

        Add to Reading List

        Source URL: archive.hack.lu

        Language: English - Date: 2014-10-24 02:11:11
          40

          Participatory Honeypots: A Paradigm Shift in the Fight Against Mobile Botnets Pasquale Stirparo (@pstirparo) Laurent Beslay www.jrc.ec.europa.eu

          Add to Reading List

          Source URL: www.botconf.eu

          Language: English - Date: 2014-12-07 18:32:49
            UPDATE