Date: 2011-08-15 19:32:40Distributed data storage Computer network security Multi-agent systems Spamming File sharing networks Botnet Storm botnet Peer-to-Peer Protocol Kademlia Distributed hash table Command and control Peer-to-peer | | Towards Complete Node Enumeration in a Peer-to-Peer Botnet Brent ByungHoon Kang1 , Eric Chan-Tin2 , Christopher P. Lee3 , James Tyra2 , Hun Jeong Kang2 , Chris Nunnery1 , Zachariah Wadler1 , Greg Sinclair1 , Nicholas HopAdd to Reading ListSource URL: www.cs.okstate.eduDownload Document from Source Website File Size: 499,95 KBShare Document on Facebook
|