Botnet

Results: 929



#Item
51Cyberwarfare / Computer network security / Cybercrime / National security / Mobile Malware / Botnet / Malware / Peer-to-peer / Bayesian network / Cabir / Computer security / Delay-tolerant networking

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-07-06 14:15:10
52Computer network security / Cyberwarfare / Computer security / Machine learning / Cryptography / Anomaly detection / Intrusion detection system / Botnet / Algorithm / NP / Internet security / Pattern recognition

Attack-Test and Verification Systems, Steps Towards Verifiable Anomaly Detection Marcel Fourn´e, Dominique Petersen, Norbert Pohlmann Institut f¨ur Internet-Sicherheit Westf¨alische Hochschule Neidenburger Str. 43

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 12:57:31
53Spamming / Computer network security / Multi-agent systems / Domain name system / Botnets / Command and control / Rustock botnet / Name server / Email spam / OpenDNS / DNS sinkhole

On Botnets that use DNS for Command and Control Christian J. Dietrich‡∗ , Christian Rossow†∗ , Felix C. Freiling‡ , Norbert Pohlmann∗ †Computer Systems Group, Vrije Universiteit Amsterdam ‡Department of C

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:20:24
54Cyberwarfare / Denial-of-service attacks / Computer network security / Denial-of-service attack / Internet Relay Chat / Botnet / Computer security / NTP server misuse and abuse / Network Time Protocol / Prolexic Technologies / Lizard Squad

First Line of Defense ® FIRST LINE OF DEFENSE

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2015-03-30 11:14:59
55Bitcoin / Cryptocurrencies / .onion / Tor / Blockchain / Coinbase / Botnet / Denial-of-service attack / Proxy server / Blockchain.info / Draft:Basics with Bitcoin

2015 IEEE Symposium on Security and Privacy Bitcoin over Tor isn’t a good idea Alex Biryukov Ivan Pustogarov

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:03
56Spamming / Computer network security / Multi-agent systems / Cyberwarfare / Cybercrime / Bitcoin / Phishing / Computer security / ZeroAccess botnet / Botnet / IID / Command and control

MARKET INTELLIGENCE eCrime Trends Report: Fourth QuarterBroadway

Add to Reading List

Source URL: internetidentity.com

Language: English - Date: 2014-03-19 14:38:36
57Cyberwarfare / Computer network security / Multi-agent systems / Spamming / Cybercrime / Botnet / Sandvine / Denial-of-service attack / Computer security / Traffic classification

Protect your subscribers, services, and network from online threats Cyber Security

Add to Reading List

Source URL: www.sandvine.com

Language: English
58Domain name system / Internet protocols / Internet Standards / DNSSEC / Domain Name System Security Extensions / Key management / Botnet / Name server / Alan Turing / Extension mechanisms for DNS

Decoding DNS data If you have a large DNS infrastructure, understanding what is happening with your real-time and historic traffic is difficult, if not impossible. Until now,

Add to Reading List

Source URL: www.nominet.uk

Language: English - Date: 2015-10-14 07:09:14
59Cyberwarfare / Antivirus software / Computer network security / ESET / Computer security / Rootkit / Internet security / Malware / Botnet / Comparison of antivirus software

Making the Internet Safer for You to Enjoy Explore the great online, securely protected by ESET’s award-winning detection technology. It’s trusted by over 100 million users worldwide to detect and neutralize all typ

Add to Reading List

Source URL: cdn5-prodint.esetstatic.com

Language: English - Date: 2016-07-26 04:26:23
60Data security / Cybercrime / Identity documents / Cryptography / Identity theft / Password / Security hacker / Data breach / Social engineering / Information security / Computer security / Email

Employee Training Series INFORMATION SECURITY TRAINING EXAMINATION 1. What is a BotNet? a.

Add to Reading List

Source URL: www.risk3sixty.com

Language: English - Date: 2015-01-31 14:51:24
UPDATE