![Computer network security / Email / Multi-agent systems / Internet ethics / Email spam / Spam / Botnet / Twitter / Zombie / Computing / Internet / Spamming Computer network security / Email / Multi-agent systems / Internet ethics / Email spam / Spam / Botnet / Twitter / Zombie / Computing / Internet / Spamming](https://www.pdfsearch.io/img/fb1a4108e4f5a390ce892cdad0772461.jpg)
| Document Date: 2010-11-03 23:17:21 Open Document File Size: 238,10 KBShare Result on Facebook
Company Twitter / Google / YouTube / TechCrunch / Facebook / Million People Worldwide / Koobface C&C / New York Times / comScore / Koobface / / / Event M&A / / Facility Social Malware Kurt Thomas University of Illinois / David M. Nicol University of Illinois / / IndustryTerm blacklist services / social networking sites / social networking site / Internet Measurement / social networking websites / social networking users / elaborate chain / software updates / spam chain / domain blacklisting services / social networking accounts / zombie infrastructure / individual systems / infection chain / internet scam hosting infrastructure / external network / valued media outlets / social networks / social network / power law distribution / search effort / redirector chain / / Organization University of Illinois / Urbana-Champaign / USENIX Association / US Federal Reserve / / Person Kim Zetter / G. Voelker / V / Urbana-Champaign / / Product Gmail / URL / Safebrowsing API / / ProgrammingLanguage PHP / JavaScript / / ProvinceOrState Illinois / / PublishedMedium New York Times / the C / / Technology PHP / API / HTML / encryption / network protocol / C&C protocol / load balancing / HTTP / Flash / / URL http /
SocialTag |