First Page | Document Content | |
---|---|---|
![]() Date: 2014-12-03 00:02:54Spamming Botnets Concurrent computing File sharing networks Peer-to-peer Storm botnet Storm Worm Connectivity Topology Multi-agent systems Computing Computer network security | Add to Reading List |
![]() | Challenges in Experimenting with Botnet Detection Systems Adam J. Aviv Andreas Haeberlen University of Pennsylvania AbstractDocID: 1qfV3 - View Document |
![]() | HiNRG Technical Report: Measuring the Storm Worm Network Sandeep Sarat Andreas TerzisDocID: 1mbv7 - View Document |
![]() | BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu† , Roberto Perdisci‡ , Junjie Zhang† , and Wenke Lee† † College of Computing, Georgia InstitutDocID: 1atIT - View Document |
![]() | Attachment 1 Computer Virus Incident Report for SeptemberVirus Detection Count by Month 2. Virus Report Count by MonthDocID: 18X5c - View Document |
![]() | Hacking in a Foreign Language: A Network Security Guide to Russia Kenneth Geers CISSPDocID: 18H9K - View Document |