Storm Worm

Results: 42



#Item
1Challenges in Experimenting with Botnet Detection Systems Adam J. Aviv Andreas Haeberlen University of Pennsylvania  Abstract

Challenges in Experimenting with Botnet Detection Systems Adam J. Aviv Andreas Haeberlen University of Pennsylvania Abstract

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-07-08 13:42:23
2HiNRG Technical Report: Measuring the Storm Worm Network Sandeep Sarat   Andreas Terzis

HiNRG Technical Report: Measuring the Storm Worm Network Sandeep Sarat Andreas Terzis

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2007-11-09 10:57:13
    3BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu† , Roberto Perdisci‡ , Junjie Zhang† , and Wenke Lee† † College of Computing, Georgia Institut

    BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu† , Roberto Perdisci‡ , Junjie Zhang† , and Wenke Lee† † College of Computing, Georgia Institut

    Add to Reading List

    Source URL: www.usenix.org

    Language: English - Date: 2008-07-14 18:18:35
    4Attachment 1  Computer Virus Incident Report for SeptemberVirus Detection Count by Month  2. Virus Report Count by Month

    Attachment 1 Computer Virus Incident Report for SeptemberVirus Detection Count by Month 2. Virus Report Count by Month

    Add to Reading List

    Source URL: www.ipa.go.jp

    Language: English - Date: 2013-05-23 07:51:49
    5Hacking in a Foreign Language: A Network Security Guide to Russia Kenneth Geers CISSP

    Hacking in a Foreign Language: A Network Security Guide to Russia Kenneth Geers CISSP

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2015-05-28 15:51:35
    6Attachment 1  Computer Virus Incident Report for NovemberVirus Detection Count by Month  2. Virus Report Count by Month

    Attachment 1 Computer Virus Incident Report for NovemberVirus Detection Count by Month 2. Virus Report Count by Month

    Add to Reading List

    Source URL: www.ipa.go.jp

    Language: English - Date: 2013-05-23 07:51:49
    7– Survey and Taxonomy of Botnet Research through Life-cycle ´ RAFAEL A. RODR´IGUEZ-GOMEZ , University of Granada ´

    – Survey and Taxonomy of Botnet Research through Life-cycle ´ RAFAEL A. RODR´IGUEZ-GOMEZ , University of Granada ´

    Add to Reading List

    Source URL: wdb.ugr.es

    Language: English - Date: 2013-09-30 02:59:52
    8Discovery techniques for P2P botnets David Dittrich Applied Physics Laboratory University of Washington

    Discovery techniques for P2P botnets David Dittrich Applied Physics Laboratory University of Washington

    Add to Reading List

    Source URL: jjcweb.jjay.cuny.edu

    Language: English - Date: 2014-12-03 00:00:08
    9Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods Elizabeth Stinson Stanford University  John C. Mitchell

    Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods Elizabeth Stinson Stanford University John C. Mitchell

    Add to Reading List

    Source URL: theory.stanford.edu

    Language: English - Date: 2010-03-09 22:02:42
    102010 ACSAC Proceedings - Papers

    2010 ACSAC Proceedings - Papers

    Add to Reading List

    Source URL: jjcweb.jjay.cuny.edu

    Language: English - Date: 2014-12-03 00:02:54