Internet bot

Results: 123



#Item
31SPARC Getting Started Guide Part 1: Before You Build Your First Bot Maybe you’ve seen BattleBotstm, been to RoboGamestm or other local events, seen video on the internet, or read event reports in Servo Magazine. Whatev

SPARC Getting Started Guide Part 1: Before You Build Your First Bot Maybe you’ve seen BattleBotstm, been to RoboGamestm or other local events, seen video on the internet, or read event reports in Servo Magazine. Whatev

Add to Reading List

Source URL: sparc.tools

Language: English - Date: 2015-06-18 19:51:43
    32BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu† , Roberto Perdisci‡ , Junjie Zhang† , and Wenke Lee† † College of Computing, Georgia Institut

    BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu† , Roberto Perdisci‡ , Junjie Zhang† , and Wenke Lee† † College of Computing, Georgia Institut

    Add to Reading List

    Source URL: faculty.cs.tamu.edu

    Language: English - Date: 2008-05-09 14:43:43
    33CAPTCHA: Using Hard AI Problems For Security Luis von Ahn1 , Manuel Blum1 , Nicholas J. Hopper1 , and John Langford2 1  Computer Science Dept., Carnegie Mellon University, Pittsburgh PA 15213, USA

    CAPTCHA: Using Hard AI Problems For Security Luis von Ahn1 , Manuel Blum1 , Nicholas J. Hopper1 , and John Langford2 1 Computer Science Dept., Carnegie Mellon University, Pittsburgh PA 15213, USA

    Add to Reading List

    Source URL: hunch.net

    Language: English - Date: 2003-09-18 19:47:10
    34The Role of Web Hosting Providers in Detecting Compromised Websites Davide Canali Davide Balzarotti

    The Role of Web Hosting Providers in Detecting Compromised Websites Davide Canali Davide Balzarotti

    Add to Reading List

    Source URL: www2013.wwwconference.org

    Language: English - Date: 2014-07-21 08:47:06
    35Microsoft Word - 18wic02-aggarwal.doc

    Microsoft Word - 18wic02-aggarwal.doc

    Add to Reading List

    Source URL: www2013.wwwconference.org

    Language: English - Date: 2014-07-21 08:46:54
    36Botnets and Beyond Crimeware in the 21st Century Bill Hayes - CISSP Omaha World-Herald Company

    Botnets and Beyond Crimeware in the 21st Century Bill Hayes - CISSP Omaha World-Herald Company

    Add to Reading List

    Source URL: www.nebraskacert.org

    Language: English - Date: 2008-05-16 20:02:08
    37CAPTCHA: Using Hard AI Problems For Security Luis von Ahn1 , Manuel Blum1 , Nicholas J. Hopper1 , and John Langford2 1  Computer Science Dept., Carnegie Mellon University, Pittsburgh PA 15213, USA

    CAPTCHA: Using Hard AI Problems For Security Luis von Ahn1 , Manuel Blum1 , Nicholas J. Hopper1 , and John Langford2 1 Computer Science Dept., Carnegie Mellon University, Pittsburgh PA 15213, USA

    Add to Reading List

    Source URL: www-users.cs.umn.edu

    Language: English - Date: 2004-09-08 16:39:25
    38

    PDF Document

    Add to Reading List

    Source URL: arxiv.org

    Language: English - Date: 2014-10-15 20:13:10
    392014 IEEE Security and Privacy Workshops  The Tricks of the Trade: What Makes Spam Campaigns Successful? Jane Iedemska, Gianluca Stringhini, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna University of Califor

    2014 IEEE Security and Privacy Workshops The Tricks of the Trade: What Makes Spam Campaigns Successful? Jane Iedemska, Gianluca Stringhini, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna University of Califor

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2014-04-30 03:11:46
    40BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu† , Roberto Perdisci‡ , Junjie Zhang† , and Wenke Lee† † College of Computing, Georgia Institut

    BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu† , Roberto Perdisci‡ , Junjie Zhang† , and Wenke Lee† † College of Computing, Georgia Institut

    Add to Reading List

    Source URL: www.usenix.org

    Language: English - Date: 2008-07-14 18:18:35