Command and control

Results: 2249



#Item
81

Active Botnet Probing to Identify Obscure Command and Control Channels Guofei Gu1 , Vinod Yegneswaran2, Phillip Porras2 , Jennifer Stoll3 , and Wenke Lee3 2 SRI International 3 Georgia Institute of Technology A&M Univers

Add to Reading List

Source URL: faculty.cs.tamu.edu

Language: English - Date: 2009-09-25 17:55:25
    82

    A r m y S c i e n c e & Te c h n o l o g y NDIA Science Engineering & Technology Conference Command, Control, Communications, and Intelligence (C3I) Portfolio Overview Mr. Kris Gardner

    Add to Reading List

    Source URL: www.defenseinnovationmarketplace.mil

    Language: English - Date: 2014-04-11 12:02:47
      83

      TELEMETRY TRACKING AND COMMANDING OVERVIEW Braxton’s ControlPoint™ (AceCP) is an Automated Space Vehicle and Ground Station Command and Control (C2) application with a “plug-in” architecture which provides nearly

      Add to Reading List

      Source URL: www.braxtontech.com

      Language: English - Date: 2014-12-23 14:50:55
        84

        BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic Guofei Gu, Junjie Zhang, and Wenke Lee School of Computer Science, College of Computing Georgia Institute of Technology Atlanta, GA 30332

        Add to Reading List

        Source URL: faculty.cs.tamu.edu

        Language: English - Date: 2007-12-18 15:06:02
          85Computing / Internet / Tor / Internet Standards / Internet protocols / Spamming / Cyberwarfare / Botnet / Command and control / .onion / .tor / Onion routing

          Challenges in protecting Tor hidden services from botnet abuse Nicholas Hopper? University of Minnesota, Minneapolis, MN USA

          Add to Reading List

          Source URL: www-users.cs.umn.edu

          Language: English - Date: 2014-04-29 14:13:49
          86

          CoCoSpot: Clustering and Recognizing Botnet Command and Control Channels using Traffic Analysis1 Christian J. Dietricha,c , Christian Rossowa,b , Norbert Pohlmanna a Institute for Internet Security, University of Applie

          Add to Reading List

          Source URL: blog.cj2s.de

          Language: English - Date: 2012-10-24 10:24:18
            87Medicine / Emergency medicine / Health care / Traumatology / Major trauma / Triage / Advanced trauma life support / Emergency department / Bleeding / Trauma / United States Army Medical Research and Materiel Command / Draft:Joint Trauma System /  the DoD Center of Excellence for Trauma

            Damage Control Resuscitation Extremity Trauma and Regenerative Medicine Research is focused on defining the injuries being incurred and conducting preclinical

            Add to Reading List

            Source URL: www.usaisr.amedd.army.mil

            Language: English - Date: 2015-11-19 11:25:00
            88Computing / Computer network security / Spamming / Multi-agent systems / Botnets / Concurrent computing / Cyberwarfare / Internet bot / Eggdrop / Denial-of-service attack / Email spam / Command and control

            Botnets and Beyond Crimeware in the 21st Century Bill Hayes - CISSP Omaha World-Herald Company

            Add to Reading List

            Source URL: www.nebraskacert.org

            Language: English - Date: 2008-05-16 20:02:08
            89

            On Botnets that use DNS for Command and Control Christian J. Dietrich†‡ , Christian Rossow∗‡ , Felix C. Freiling† , Herbert Bos∗ , Maarten van Steen∗ and Norbert Pohlmann‡ ∗

            Add to Reading List

            Source URL: www.cj2s.de

            Language: English - Date: 2011-08-22 11:42:14
              90

              Custom Work Aids for Distributed Command and Control Teams: A Key to Enabling Highly Effective Teams

              Add to Reading List

              Source URL: www.dodccrp.org

              Language: English - Date: 2012-10-03 11:45:00
                UPDATE