Botnets

Results: 408



#Item
61Spamming / Statistics / Botnets / Bots / Storm botnet / Internet bot / Cluster analysis / Storm Worm / Hierarchical clustering / Computer network security / Computing / Multi-agent systems

BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu† , Roberto Perdisci‡ , Junjie Zhang† , and Wenke Lee† † College of Computing, Georgia Institut

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2008-07-14 18:18:35
62Computer network security / Multi-agent systems / Spamming / File sharing networks / Deep packet inspection / Botnet / Peer-to-peer / ANts P2P / Storm botnet / Computing / Concurrent computing / Distributed computing

2014 IEEE Security and Privacy Workshops PeerShark: Detecting Peer-to-Peer Botnets by Tracking Conversations Pratik Narang, Subhajit Ray, Chittaranjan Hota

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2014-04-30 03:11:19
63Spamming / Botnets / Denial-of-service attacks / Internet Relay Chat / Android Cloud to Device Messaging Service / Denial-of-service attack / Push technology / Malware / Windows Mobile / Computing / Computer network security / Multi-agent systems

Cloud-based Push-Styled Mobile Botnets: A Case Study of Exploiting the Cloud to Device Messaging Service Shuang Zhao Patrick P.C. Lee John C.S. Lui Xiaohong Guan Xiaobo Ma Jing Tao

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2012-08-15 23:52:07
64Spamming / Botnets / Cyberwarfare / Koobface / BredoLab botnet / Information Warfare Monitor / Crimeware / Malware / Gumblar / Computer network security / Computing / Multi-agent systems

KOOBFACE: JR04-2010 Inside a Crimeware Network By NART VILLENEUVE

Add to Reading List

Source URL: www.nartv.org

Language: English - Date: 2010-11-12 14:14:17
65Social engineering / Computer crimes / Spamming / Hacking / Botnets / Zeus / Man-in-the-browser / Hacktivism / Industrial espionage / Cybercrime / Computing / Malware

THE CURRENT STATE OF CYBERCRIME 2013 An Inside Look at the Changing Threat Landscape Cybercrime continues to diverge down different paths with each new year that passes. In 2013, cybercriminals are changing the way they

Add to Reading List

Source URL: www.emc.com

Language: English
66Spamming / Cyberwarfare / Botnets / Computer security / Malware / Internet privacy / Denial-of-service attack / Search warrant / Computer crime / Computer network security / Computing / Multi-agent systems

Comments on Proposed Remote Search Rules Steven M. Bellovin Columbia University∗ Matt Blaze University of Pennsylvania*

Add to Reading List

Source URL: privacyink.org

Language: English - Date: 2014-10-31 18:13:12
67Computer crimes / Bank fraud / Zeus / Malware / Computer security / Kaspersky Lab / Software / Spamming / Antivirus software / System software / Botnets

The Luuuk banking fraud campaign: half a million euros stolen in a single week The Luuuk banking fraud campaign: half a million euros stolen in a single week The experts at Kaspersky Lab’s Global Research and Analysis

Add to Reading List

Source URL: press.kaspersky.com

Language: English - Date: 2014-06-20 07:32:13
68Denial-of-service attacks / Spamming / Cyberwarfare / Computer security / Botnets / Video game bot / DoSnet / Internet Relay Chat / Denial-of-service attack / Computer network security / Computing / Multi-agent systems

Botnets An Introduction Into the World of Botnets Tyler Hudak KoreLogic Security

Add to Reading List

Source URL: www.korelogic.com

Language: English - Date: 2015-05-27 15:39:14
69Antivirus software / Botnets / Computer virus / Computer worm / Zeus / Trojan horse / Microsoft Security Essentials / Malware / System software / Software

Microsoft Security Intelligence Report Volume 16 | July through December, 2013 Tunisia This document is for informational purposes only. MICROSOFT MAKES NO

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2014-05-14 12:26:59
70Multi-agent systems / Domain name system / Botnets / Internet / Malware / Conficker / Top-level domain / Mariposa botnet / McColo / Computer network security / Spamming / Computing

Beheading Hydras: Performing Effective Botnet Takedowns Yacin Nadji Manos Antonakakis

Add to Reading List

Source URL: www.cc.gatech.edu

Language: English - Date: 2013-10-22 16:20:02
UPDATE