Botnets

Results: 408



#Item
61BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu† , Roberto Perdisci‡ , Junjie Zhang† , and Wenke Lee† † College of Computing, Georgia Institut

BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu† , Roberto Perdisci‡ , Junjie Zhang† , and Wenke Lee† † College of Computing, Georgia Institut

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2008-07-14 18:18:35
622014 IEEE Security and Privacy Workshops  PeerShark: Detecting Peer-to-Peer Botnets by Tracking Conversations Pratik Narang, Subhajit Ray, Chittaranjan Hota

2014 IEEE Security and Privacy Workshops PeerShark: Detecting Peer-to-Peer Botnets by Tracking Conversations Pratik Narang, Subhajit Ray, Chittaranjan Hota

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2014-04-30 03:11:19
63Cloud-based Push-Styled Mobile Botnets: A Case Study of Exploiting the Cloud to Device Messaging Service Shuang Zhao Patrick P.C. Lee John C.S. Lui Xiaohong Guan Xiaobo Ma Jing Tao

Cloud-based Push-Styled Mobile Botnets: A Case Study of Exploiting the Cloud to Device Messaging Service Shuang Zhao Patrick P.C. Lee John C.S. Lui Xiaohong Guan Xiaobo Ma Jing Tao

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2012-08-15 23:52:07
64KOOBFACE:  JR04-2010 Inside a Crimeware Network By NART VILLENEUVE

KOOBFACE: JR04-2010 Inside a Crimeware Network By NART VILLENEUVE

Add to Reading List

Source URL: www.nartv.org

Language: English - Date: 2010-11-12 14:14:17
65THE CURRENT STATE OF CYBERCRIME 2013 An Inside Look at the Changing Threat Landscape Cybercrime continues to diverge down different paths with each new year that passes. In 2013, cybercriminals are changing the way they

THE CURRENT STATE OF CYBERCRIME 2013 An Inside Look at the Changing Threat Landscape Cybercrime continues to diverge down different paths with each new year that passes. In 2013, cybercriminals are changing the way they

Add to Reading List

Source URL: www.emc.com

Language: English
66Comments on Proposed Remote Search Rules Steven M. Bellovin Columbia University∗ Matt Blaze University of Pennsylvania*

Comments on Proposed Remote Search Rules Steven M. Bellovin Columbia University∗ Matt Blaze University of Pennsylvania*

Add to Reading List

Source URL: privacyink.org

Language: English - Date: 2014-10-31 18:13:12
67The Luuuk banking fraud campaign: half a million euros stolen in a single week The Luuuk banking fraud campaign: half a million euros stolen in a single week The experts at Kaspersky Lab’s Global Research and Analysis

The Luuuk banking fraud campaign: half a million euros stolen in a single week The Luuuk banking fraud campaign: half a million euros stolen in a single week The experts at Kaspersky Lab’s Global Research and Analysis

Add to Reading List

Source URL: press.kaspersky.com

Language: English - Date: 2014-06-20 07:32:13
68Botnets An Introduction Into the World of Botnets Tyler Hudak KoreLogic Security

Botnets An Introduction Into the World of Botnets Tyler Hudak KoreLogic Security

Add to Reading List

Source URL: www.korelogic.com

Language: English - Date: 2015-05-27 15:39:14
69Microsoft Security Intelligence Report Volume 16 | July through December, 2013 Tunisia This document is for informational purposes only. MICROSOFT MAKES NO

Microsoft Security Intelligence Report Volume 16 | July through December, 2013 Tunisia This document is for informational purposes only. MICROSOFT MAKES NO

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2014-05-14 12:26:59
70Beheading Hydras: Performing Effective Botnet Takedowns Yacin Nadji Manos Antonakakis

Beheading Hydras: Performing Effective Botnet Takedowns Yacin Nadji Manos Antonakakis

Add to Reading List

Source URL: www.cc.gatech.edu

Language: English - Date: 2013-10-22 16:20:02