First Page | Document Content | |
---|---|---|
![]() Date: 2014-06-18 01:23:21Multi-agent systems Spamming Cyberwarfare Malware Zeus Zombie Torpig Conficker Denial-of-service attack Computer network security Computing Botnets | Add to Reading List |
![]() | Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna University of CaliforniaDocID: 1l2Sv - View Document |
![]() | Microsoft Word - iDefense_RRT_Torpig_20070703.docDocID: 1jMKO - View Document |
![]() | The Torpig/Anserin/Sinowal family of Trojans detect virtual machine monitors and abort infection when presentDocID: 19NoP - View Document |
![]() | – Survey and Taxonomy of Botnet Research through Life-cycle ´ RAFAEL A. RODR´IGUEZ-GOMEZ , University of Granada ´DocID: 17AJO - View Document |
![]() | Microsoft PowerPoint - botnet_detection2009.pptDocID: 11hlY - View Document |