<--- Back to Details
First PageDocument Content
Botnets / Multi-agent systems / Malware / Cyberwarfare / Rootkits / Torpig / Srizbi botnet / Mebroot / Fast flux / Computing / Spamming / Computer network security
Date: 2013-08-28 21:33:56
Botnets
Multi-agent systems
Malware
Cyberwarfare
Rootkits
Torpig
Srizbi botnet
Mebroot
Fast flux
Computing
Spamming
Computer network security

Malware Analysis Analysis of a

Add to Reading List

Source URL: www.cs.ucsb.edu

Download Document from Source Website

File Size: 851,42 KB

Share Document on Facebook

Similar Documents

Botnets / Computing / Computer network security / Multi-agent systems / Spamming / Malware / Cyberwarfare / Torpig / Srizbi botnet / Command and control / Festi / Fast flux

Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna University of California

DocID: 1l2Sv - View Document

Microsoft Word - iDefense_RRT_Torpig_20070703.doc

DocID: 1jMKO - View Document

X86 architecture / UPX / Computing / MOV / Assembly languages / CPUID / Computer architecture / Software / X86 instructions

The Torpig/Anserin/Sinowal family of Trojans detect virtual machine monitors and abort infection when present

DocID: 19NoP - View Document

Multi-agent systems / Spamming / Cyberwarfare / Storm botnet / Storm Worm / Zombie / Waledac botnet / Torpig / Zeus / Computer network security / Computing / Botnets

– Survey and Taxonomy of Botnet Research through Life-cycle ´ RAFAEL A. RODR´IGUEZ-GOMEZ , University of Granada ´

DocID: 17AJO - View Document

Multi-agent systems / Spamming / Cyberwarfare / Malware / Zeus / Zombie / Torpig / Conficker / Denial-of-service attack / Computer network security / Computing / Botnets

Microsoft PowerPoint - botnet_detection2009.ppt

DocID: 11hlY - View Document