<--- Back to Details
First PageDocument Content
Multi-agent systems / Spamming / Cyberwarfare / Malware / Zeus / Zombie / Torpig / Conficker / Denial-of-service attack / Computer network security / Computing / Botnets
Date: 2014-06-18 01:23:20
Multi-agent systems
Spamming
Cyberwarfare
Malware
Zeus
Zombie
Torpig
Conficker
Denial-of-service attack
Computer network security
Computing
Botnets

Microsoft PowerPoint - botnet_detection2009.ppt

Add to Reading List

Source URL: www.infosec.gov.hk

Download Document from Source Website

File Size: 628,32 KB

Share Document on Facebook

Similar Documents

Why is Vipre not removing Conficker / Kido / Downadup

DocID: 1uMrl - View Document

T H E H O N E Y N E T P R O J E C T ® | KYE Paper Know Your Enemy: Containing Conficker To Tame A Malware The Honeynet Project http://honeynet.org

DocID: 1u2oB - View Document

Computer network security / Multi-agent systems / Spamming / Botnets / United States v. Nosal / Computer Fraud and Abuse Act / Zombie / Computer worm / Mariposa botnet / Conficker / Rustock botnet / Srizbi botnet

Testimony of Amie Stepanovich  Senior Policy Counsel, Access  on behalf of   Access and the Electronic Frontier Foundation  Before the Advisory Committee on Criminal Rules  on the Matter of P

DocID: 1osj7 - View Document

Conficker and Beyond: A Large-Scale Empirical Study Seungwon Shin and Guofei Gu SUCCESS LAB Texas A&M University

DocID: 1lQAQ - View Document

conficker_jrnl_final_doublecol.pdf

DocID: 1lMDd - View Document