Botnet

Results: 929



#Item
101

Antisocial Networks: Turning a Social Network into a Botnet E. Athanasopoulos1 , A. Makridakis1 , S. Antonatos1 , D. Antoniades1 , S. Ioannidis1 , K. G. Anagnostakis2, E. P. Markatos1 1

Add to Reading List

Source URL: users.ics.forth.gr

Language: English - Date: 2010-11-23 05:43:52
    102Spamming / Email spam / Anti-spam techniques / Srizbi botnet / Spambot / Botnet / SpamAssassin / Email filtering / Spam / Storm botnet / Image spam / Spam Reader

    Botnet Judo: Fighting Spam with Itself Andreas Pitsillidis∗ Kirill Levchenko∗ Geoffrey M. Voelker∗

    Add to Reading List

    Source URL: www1.icsi.berkeley.edu

    Language: English - Date: 2012-09-26 16:43:01
    103Botnets / Computing / Computer network security / Multi-agent systems / Spamming / Malware / Cyberwarfare / Torpig / Srizbi botnet / Command and control / Festi / Fast flux

    Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna University of California

    Add to Reading List

    Source URL: seclab.cs.ucsb.edu

    Language: English - Date: 2010-12-20 14:49:07
    104

    Beheading Hydras: Performing Effective Botnet Takedowns Yacin Nadji Manos Antonakakis

    Add to Reading List

    Source URL: astrolavos.gatech.edu

    Language: English - Date: 2016-01-27 10:57:12
      105Spamming / Computing / Computer network security / Multi-agent systems / Botnets / Concurrent computing / Cyberwarfare / Command and control / Storm botnet / Cluster analysis / Internet bot / Hierarchical clustering

      BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu† , Roberto Perdisci‡ , Junjie Zhang† , and Wenke Lee† † College of Computing, Georgia Institut

      Add to Reading List

      Source URL: faculty.cs.tamu.edu

      Language: English - Date: 2008-05-09 14:43:43
      106Cryptography / Cyberwarfare / Malware / Malware analysis / Encryption / Rootkit / HTTPS / Botnet / Block cipher / Advanced Encryption Standard / Cipher / Draft:Energy related security attacks

      Institut für Technische Informatik und Kommunikationsnetze No´e Lutz

      Add to Reading List

      Source URL: www.kutter-fonds.ethz.ch

      Language: English - Date: 2010-05-16 10:46:32
      107

      . Linux/Moose endangered or extinct? An update on this atypical embedded Linux botnet by Olivier Bilodeau

      Add to Reading List

      Source URL: www.virusbtn.com

        108

        Active Botnet Probing to Identify Obscure Command and Control Channels Guofei Gu1 , Vinod Yegneswaran2, Phillip Porras2 , Jennifer Stoll3 , and Wenke Lee3 2 SRI International 3 Georgia Institute of Technology A&M Univers

        Add to Reading List

        Source URL: faculty.cs.tamu.edu

        Language: English - Date: 2009-09-25 17:55:25
          109

          BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic Guofei Gu, Junjie Zhang, and Wenke Lee School of Computer Science, College of Computing Georgia Institute of Technology Atlanta, GA 30332

          Add to Reading List

          Source URL: faculty.cs.tamu.edu

          Language: English - Date: 2007-12-18 15:06:02
            110Computing / Internet / Tor / Internet Standards / Internet protocols / Spamming / Cyberwarfare / Botnet / Command and control / .onion / .tor / Onion routing

            Challenges in protecting Tor hidden services from botnet abuse Nicholas Hopper? University of Minnesota, Minneapolis, MN USA

            Add to Reading List

            Source URL: www-users.cs.umn.edu

            Language: English - Date: 2014-04-29 14:13:49
            UPDATE