First Page | Document Content | |
---|---|---|
![]() Date: 2013-08-28 21:33:56Botnets Multi-agent systems Malware Cyberwarfare Rootkits Torpig Srizbi botnet Mebroot Fast flux Computing Spamming Computer network security | Add to Reading List |
![]() | Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna University of CaliforniaDocID: 1l2Sv - View Document |
![]() | Microsoft Word - iDefense_RRT_Torpig_20070703.docDocID: 1jMKO - View Document |
![]() | The Torpig/Anserin/Sinowal family of Trojans detect virtual machine monitors and abort infection when presentDocID: 19NoP - View Document |
![]() | – Survey and Taxonomy of Botnet Research through Life-cycle ´ RAFAEL A. RODR´IGUEZ-GOMEZ , University of Granada ´DocID: 17AJO - View Document |
![]() | Microsoft PowerPoint - botnet_detection2009.pptDocID: 11hlY - View Document |