Date: 2013-04-29 06:32:55Spamming File sharing networks Concurrent computing Botnets Storm botnet Peer-to-peer Kad network Malware DoSnet Multi-agent systems Computer network security Computing | | Botnet detection revisited: Theory and Practice of Finding Malicious P2P Networks via Internet Connection Graphs Stefan Ruehrup, Pierfrancesco Urbano, Andreas Berger, Alessandro D’Alconzo FTW, Vienna, AustriaAdd to Reading ListSource URL: infocom.di.unimi.itDownload Document from Source Website File Size: 2,26 MBShare Document on Facebook
|