Detection

Results: 16932



#Item
1Computer network security / Computing / Multi-agent systems / Spamming / Cybercrime / Cyberwarfare / Malware / Botnet / Intrusion detection system

A Study of Botnets: Systemization of Knowledge and Correlation-based Detection By Shehar Bano

Add to Reading List

Source URL: sheharbano.com

Language: English - Date: 2017-02-16 07:58:18
2Computer network security / Computing / Security engineering / Computer security / Cyberwarfare / Cybercrime / Spamming / Multi-agent systems / Botnet / Complex event processing / Zeek / Blacklist

POSTER: BotFlex: A Community-driven Tool for Botnet Detection Sheharbano Khattak Independent Researcher

Add to Reading List

Source URL: sheharbano.com

Language: English - Date: 2017-02-16 07:58:23
3

LeakChecker: Practical Static Memory Leak Detection for Managed Languages Dacong Yan Guoqing Xu

Add to Reading List

Source URL: dacongy.github.io

Language: English - Date: 2017-06-27 01:04:15
    4Computing / Information and communications technology / Internet / Spamming / Security breaches / Botnet / Command and control / Computer network security / Malware / HTTP referer / Blacklist / Online Certificate Status Protocol

    Unsupervised Detection of APT C&C Channels using Web Request Graphs Pavlos Lamprakis1 , Ruggiero Dargenio1 , David Gugelmann1 , Vincent Lenders2 , Markus Happe1 , and Laurent Vanbever1 1 2

    Add to Reading List

    Source URL: www.lenders.ch

    Language: English - Date: 2017-06-18 04:02:10
    5Deception / Human behavior / World Wide Web / Internet troll / Sockpuppet / Internet culture / Hoax

    Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf) Jure Leskovec (@jure) Slides are available at http://snap.stanford.edu/www2017tutorial/

    Add to Reading List

    Source URL: snap.stanford.edu

    Language: English - Date: 2017-04-03 00:44:26
    6Computational neuroscience / Artificial intelligence / Artificial neural networks / Computing / Applied mathematics / Computational statistics / Market research / Mathematical psychology / Convolutional neural network / Image segmentation / Document Object Model / Market segmentation

    Hierarchical segmentation of graphical interfaces for Document Object Model reconstruction C˘at˘alin F. Pert, icas, 1 Mihai S. Baba 1 Homa Davoudi 1 R˘azvan V. Florian 1 Figure 1. Detection of graphical elements usin

    Add to Reading List

    Source URL: uclmr.github.io

    Language: English - Date: 2018-08-06 06:17:49
    7World Wide Web / Digital marketing / Internet search engines / Search engine optimization / Spamming / HTML / Meta element / Google Search / Reserved word / Spamdexing / Baidu / AdWords

    How to Learn Klingon Without a Dictionary: Detection and Measurement of Black Keywords Used by the Underground Economy Hao Yang1 , Xiulin Ma1 , Kun Du1 , Zhou Li2 , Haixin Duan1* , Xiaodong Su3 , Guang Liu3 , Zhifeng Gen

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 15:58:24
    8Computing / Free software / Dark web / Internet / Cryptographic protocols / Internet Standards / Computer network security / Tor / .onion / Botnet / Internet privacy / Bipartite graph

    HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-12 23:38:22
    9Computer programming / Computing / Mathematics / Theoretical computer science / Boolean algebra / Error detection and correction / Compiler construction / Hash function / Avalanche effect / Optimizing compiler / Recursion / MD5

    Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping Dongpeng Xu The Pennsylvania State University University Park, USA Email:

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 15:56:44
    10Social information processing / Wikipedia reliability / Collaboration / Digital media / WikiTrust / Wiki / Vandalism / World Wide Web / TW

    Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf) Jure Leskovec (@jure) Slides are available at http://snap.stanford.edu/www2017tutorial/

    Add to Reading List

    Source URL: snap.stanford.edu

    Language: English - Date: 2017-04-03 00:39:08
    UPDATE