<--- Back to Details
First PageDocument Content
Concurrent computing / Computer network security / Multi-agent systems / Spamming / Computing / Cybercrime / Distributed computing / Malware / Botnet / Peer-to-peer / Social peer-to-peer processes
Date: 2017-05-12 09:17:38
Concurrent computing
Computer network security
Multi-agent systems
Spamming
Computing
Cybercrime
Distributed computing
Malware
Botnet
Peer-to-peer
Social peer-to-peer processes

Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2 Institute of Information Engineering, Chinese Academy of Sciences

Add to Reading List

Source URL: www.ieee-security.org

Download Document from Source Website

File Size: 376,41 KB

Share Document on Facebook

Similar Documents

Distributed Computing Prof. R. Wattenhofer BA/MA/SA:  A Hybrid Blockchain System

Distributed Computing Prof. R. Wattenhofer BA/MA/SA: A Hybrid Blockchain System

DocID: 1xVNV - View Document

Distributed Computing Prof. R. Wattenhofer SA/MA:  Byzantine Reinforcement Learning

Distributed Computing Prof. R. Wattenhofer SA/MA: Byzantine Reinforcement Learning

DocID: 1xVKs - View Document

Distributed Computing Prof. R. Wattenhofer Activity Recognition and Adversarial Learning with Smartwatches

Distributed Computing Prof. R. Wattenhofer Activity Recognition and Adversarial Learning with Smartwatches

DocID: 1xVFo - View Document

Distributed Computing Prof. R. Wattenhofer BA/SA/Group/Lab:  Dynamic Directories

Distributed Computing Prof. R. Wattenhofer BA/SA/Group/Lab: Dynamic Directories

DocID: 1xVCB - View Document

Distributed Computing Prof. R. Wattenhofer Advanced Topics in Deep Learning - Disentangled Representations

Distributed Computing Prof. R. Wattenhofer Advanced Topics in Deep Learning - Disentangled Representations

DocID: 1xVwm - View Document