![Cryptocurrencies / Bitcoin / Concurrent computing / Computing / Computer network security / Multi-agent systems / Spamming / Cybercrime / Botnet / Mining pool / ZeroAccess botnet / Satoshi Nakamoto Cryptocurrencies / Bitcoin / Concurrent computing / Computing / Computer network security / Multi-agent systems / Spamming / Cybercrime / Botnet / Mining pool / ZeroAccess botnet / Satoshi Nakamoto](https://www.pdfsearch.io/img/f83b037c1ebf3381aa8de7d5865bc605.jpg) Date: 2018-10-23 14:58:02Cryptocurrencies Bitcoin Concurrent computing Computing Computer network security Multi-agent systems Spamming Cybercrime Botnet Mining pool ZeroAccess botnet Satoshi Nakamoto | | Botcoin: Monetizing Stolen Cycles Danny Yuxing Huang, Hitesh Dharmdasani† , Sarah Meiklejohn Vacha Dave, Chris Grier∗ , Damon McCoy† , Stefan Savage, Nicholas Weaver∗ Alex C. Snoeren and Kirill Levchenko UC San DAdd to Reading ListSource URL: smeiklej.comDownload Document from Source Website File Size: 640,27 KBShare Document on Facebook
|