<--- Back to Details
First PageDocument Content
Spamming / Botnets / Internet Relay Chat / Storm botnet / Peer-to-peer / Internet Relay Chat bot / Fast flux / Denial-of-service attack / Storm Worm / Computing / Computer network security / Multi-agent systems
Date: 2014-12-03 00:00:08
Spamming
Botnets
Internet Relay Chat
Storm botnet
Peer-to-peer
Internet Relay Chat bot
Fast flux
Denial-of-service attack
Storm Worm
Computing
Computer network security
Multi-agent systems

Discovery techniques for P2P botnets David Dittrich Applied Physics Laboratory University of Washington

Add to Reading List

Source URL: jjcweb.jjay.cuny.edu

Download Document from Source Website

File Size: 1,58 MB

Share Document on Facebook

Similar Documents

Measuring & Studying Cybercrime Richard Clayton Cambridge Cloud Cybercrime Centre Cambridge 14th July 2016

Measuring & Studying Cybercrime Richard Clayton Cambridge Cloud Cybercrime Centre Cambridge 14th July 2016

DocID: 1pvbw - View Document

FLUX RESCUE WHAT TO DO IF YOU BREAKDOWN IN THE UK Flux Rescue operates 24 hours a day, 365 days a year. Our trained staff are equipped with the most up to date mapping technology and computers to provide a fast and effic

FLUX RESCUE WHAT TO DO IF YOU BREAKDOWN IN THE UK Flux Rescue operates 24 hours a day, 365 days a year. Our trained staff are equipped with the most up to date mapping technology and computers to provide a fast and effic

DocID: 1orwK - View Document

Pin-Level Reconstruction of Various Neutronic Quantities in Fast Reactors: Enhanced Physical Insight and Visualization Tools Mark Reed*, Nicholas Touran†, Kord Smith*, Benoit Forget* *Massachusetts Institute of Technol

Pin-Level Reconstruction of Various Neutronic Quantities in Fast Reactors: Enhanced Physical Insight and Visualization Tools Mark Reed*, Nicholas Touran†, Kord Smith*, Benoit Forget* *Massachusetts Institute of Technol

DocID: 1mAc2 - View Document

IID WHITE PAPER  Surveying the DNS Threat Landscape by Rod Rasmussen and Paul Vixie Executive summary Strong enterprise security in 2013 requires a

IID WHITE PAPER Surveying the DNS Threat Landscape by Rod Rasmussen and Paul Vixie Executive summary Strong enterprise security in 2013 requires a

DocID: 1mem4 - View Document

Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna University of California

Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna University of California

DocID: 1l2Sv - View Document