<--- Back to Details
First PageDocument Content
Concurrent computing / Computer network security / Multi-agent systems / Spamming / Computing / Cybercrime / Distributed computing / Malware / Botnet / Peer-to-peer / Social peer-to-peer processes
Date: 2017-05-12 09:17:38
Concurrent computing
Computer network security
Multi-agent systems
Spamming
Computing
Cybercrime
Distributed computing
Malware
Botnet
Peer-to-peer
Social peer-to-peer processes

Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2 Institute of Information Engineering, Chinese Academy of Sciences

Add to Reading List

Source URL: www.ieee-security.org

Download Document from Source Website

File Size: 376,41 KB

Share Document on Facebook

Similar Documents

TESTIMONY OF  Kathryn Haun Rodriguez Former Assistant U.S. Attorney, U.S. Department of Justice, Lecturer in Law on Cybercrime and Digital Currency, Stanford University Current Member of the Board of Directors, Coinbase

TESTIMONY OF Kathryn Haun Rodriguez Former Assistant U.S. Attorney, U.S. Department of Justice, Lecturer in Law on Cybercrime and Digital Currency, Stanford University Current Member of the Board of Directors, Coinbase

DocID: 1xU9h - View Document

Cybercrime After the Sunrise: A Statistical Analysis of DNS Abuse in New gTLDs

Cybercrime After the Sunrise: A Statistical Analysis of DNS Abuse in New gTLDs

DocID: 1vr3e - View Document

Fighting Cybercrime with Packet Attestation Andreas Haeberlen University of Pennsylvania Pedro Fonseca

Fighting Cybercrime with Packet Attestation Andreas Haeberlen University of Pennsylvania Pedro Fonseca

DocID: 1vn3h - View Document

I N D U S T RY S O LUT ION BR I E F Malwarebytes for Finance Preventing and remediating financial cybercrime

I N D U S T RY S O LUT ION BR I E F Malwarebytes for Finance Preventing and remediating financial cybercrime

DocID: 1vm3f - View Document

THE FACTS :  NEW ZEALAND CYBERCRIME IN

THE FACTS : NEW ZEALAND CYBERCRIME IN

DocID: 1vex1 - View Document