Botnet

Results: 929



#Item
71

OUR INNOVATION – YOUR SECURITY PineApp™ Outbound Spam Guard™ An Anti-Botnet Solution With global broadband penetration rates increasing and mobile phone/ smart phone technologies becoming more accessible, the burd

Add to Reading List

Source URL: www.sekureit.net

Language: English - Date: 2014-07-27 13:08:54
    72Computing / Concurrent computing / Distributed data storage / Computer network security / Multi-agent systems / Spamming / Distributed computing / Cyberwarfare / Botnet / Command and control / Distributed hash table / Kad network

    Tsunami: A parasitic, indestructible botnet on Kad Ghulam Memon, Jun Li & Reza Rejaie Peer-to-Peer Networking and

    Add to Reading List

    Source URL: mirage.cs.uoregon.edu

    Language: English - Date: 2013-04-22 13:17:57
    73

    Turning-your-managed-AV-into-my-botnet_OWASP2013_Nokin-Jerome_v1.1

    Add to Reading List

    Source URL: funoverip.net

    Language: English - Date: 2013-12-11 07:37:00
      74Marketing / Economy / Internet marketing / Business / Online advertising / Internet bot / Internet advertising / Botnet / Internet fraud / Advertising / TubeMogul / AdWords

      TAKE 5: WHAT IS AD FRAUD?

      Add to Reading List

      Source URL: apsalar.com

      Language: English - Date: 2015-08-05 19:48:38
      75

      Botnet Tracking – The need for Passive DNS Tom „c-APT-ure“ Ueltschi SwiNOG #25 Outline

      Add to Reading List

      Source URL: www.swinog.ch

      Language: English - Date: 2012-11-07 09:10:22
        76Cyberwarfare / Computer security / Computing / Malware / Computer network security / Computer viruses / Hacking / Zero-day / Botnet / Antivirus software / Vulnerability

        THE MITRE CORPORATION THE MAEC™ LANGUAGE OVERVIEW DESIREE BECK, IVAN KIRILLOV, PENNY CHASE, MITRE JUNE 12, 2014

        Add to Reading List

        Source URL: maecproject.github.io

        Language: English - Date: 2016-06-15 18:10:07
        77Computing / Software / Cyberspace / Spamming / Social networking services / Computer network security / Cybercrime / E-commerce / Twitter / Vulnerability / Computer security / Botnet

        A Categorization Scheme for Socialbot Attacks In Online Social Networks Silvia Mitter Knowledge Technologies Institute Graz University of Technology, Austria

        Add to Reading List

        Source URL: claudiawagner.info

        Language: English - Date: 2013-08-25 09:03:46
        78Software / Computing / Social networking services / World Wide Web / Social media / Universal Windows Platform apps / Web 2.0 / Bots / Twitter / Social bot / Facebook / Botnet

        When social bots attack: Modeling susceptibility of users in online social networks Claudia Wagner Silvia Mitter

        Add to Reading List

        Source URL: claudiawagner.info

        Language: English - Date: 2013-08-25 09:03:44
        79Game theory / Cyberwarfare / Bitcoin / Denial-of-service attacks / Denial-of-service attack / Nash equilibrium / Botnet / Best response

        Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools Benjamin Johnson1 , Aron Laszka2 , Jens Grossklags3 , Marie Vasek4 and Tyler Moore4 1 2

        Add to Reading List

        Source URL: fc14.ifca.ai

        Language: English - Date: 2014-02-18 12:20:19
        80Internet / Domain name system / Computing / .nl / Botnet / Domain name / Country code top-level domain / .org / Top-level domain / Domain registration / .nu / .eu

        Master Thesis as part of the major in Security & Privacy at the EIT Digital Master School SIDekICk SuspIcious DomaIn Classification

        Add to Reading List

        Source URL: www.sidnlabs.nl

        Language: English - Date: 2016-04-12 04:39:02
        UPDATE