<--- Back to Details
First PageDocument Content
Cybercrime / Computer network security / Cyberwarfare / Computing / Spamming / Malware / Domain generation algorithm / Botnet / Web threat / Blacklist
Date: 2017-04-03 15:56:17
Cybercrime
Computer network security
Cyberwarfare
Computing
Spamming
Malware
Domain generation algorithm
Botnet
Web threat
Blacklist

A Lustrum of Malware Network Communication: Evolution and Insights Chaz Lever† , Platon Kotzias∗ , Davide Balzarotti∓ , Juan Caballero∗ , Manos Antonakakis‡ {chazlever,manos}@gatech.edu, davide.balzarotti@eurec

Add to Reading List

Source URL: www.ieee-security.org

Download Document from Source Website

File Size: 988,40 KB

Share Document on Facebook

Similar Documents

S O LU T I O N S H E E T  MarkMonitor Dark Web and Cyber IntelligenceTM Dark Web Threat Intelligence to Protect Against Cyberattacks

S O LU T I O N S H E E T MarkMonitor Dark Web and Cyber IntelligenceTM Dark Web Threat Intelligence to Protect Against Cyberattacks

DocID: 1tO8w - View Document

ThreatRadar:Web アプリケーション Threat Intelligence データシート  オンライン事業に影響を及ぼす脅威を事前に防御

ThreatRadar:Web アプリケーション Threat Intelligence データシート オンライン事業に影響を及ぼす脅威を事前に防御

DocID: 1tGam - View Document

Media Scanner for Malware Prevention—Websites TM Enterprise IT fails to address the growing threat of web-based malware Growing at an alarming rate, web-based malware is a constant, silent and invisible threat that’s

Media Scanner for Malware Prevention—Websites TM Enterprise IT fails to address the growing threat of web-based malware Growing at an alarming rate, web-based malware is a constant, silent and invisible threat that’s

DocID: 1tFMD - View Document

Web Browser History Detection as a Real-World Privacy Threat Artur Janc1 and Lukasz Olejnik2 ,

Web Browser History Detection as a Real-World Privacy Threat Artur Janc1 and Lukasz Olejnik2 ,

DocID: 1tCQS - View Document

Issues in Information Systems Volume 17, Issue III, pp, 2016 EFFECTIVENESS OF USING CARD GAMES TO TEACH THREAT MODELING FOR SECURE WEB APPLICATION DEVELOPMENTS

Issues in Information Systems Volume 17, Issue III, pp, 2016 EFFECTIVENESS OF USING CARD GAMES TO TEACH THREAT MODELING FOR SECURE WEB APPLICATION DEVELOPMENTS

DocID: 1teLA - View Document