First Page | Document Content | |
---|---|---|
![]() Date: 2011-03-29 08:17:00Internet Multi-agent systems Botnets Denial-of-service attacks Malware Denial-of-service attack Shadowserver Trojan horse Spam Computing Computer network security Spamming | Add to Reading List |
![]() | European Cyber-Security Research and Innovation by Federico Maggi, Stefano Zanero, and Evangelos Markatos Looking back at the evolution of cyber criminal activities, from the nineties to the present day, weDocID: 18uSc - View Document |
![]() | PDF DocumentDocID: 17v1R - View Document |
![]() | An In-Depth Look at the Georgia-Russia Cyber Conflict of 2008DocID: 101vo - View Document |
![]() | Microsoft PowerPoint - ISP Talk.pptDocID: Zs6i - View Document |
![]() | Microsoft PowerPoint - ISP Talk.pptDocID: Zkkv - View Document |