341![Insights from the Analysis of the Mariposa Botnet Prosenjit Sinha, Amine Boukhtouta, Victor Heber Belarde, Mourad Debbabi NCFTA Canada & the Computer Security Laboratory Insights from the Analysis of the Mariposa Botnet Prosenjit Sinha, Amine Boukhtouta, Victor Heber Belarde, Mourad Debbabi NCFTA Canada & the Computer Security Laboratory](https://www.pdfsearch.io/img/b971c5114b03dc7e04d44d95b755d267.jpg) | Add to Reading ListSource URL: www.ncfta.caLanguage: English - Date: 2010-09-10 20:48:10
|
---|
342![Festi
botnet
analysis
and
investigation
Aleksandr
Matrosov,
Eugene
Rodionov
Keywords: Festi, spam, botnet, rootkit, DDoS, OOP, HIPS, firewall Festi
botnet
analysis
and
investigation
Aleksandr
Matrosov,
Eugene
Rodionov
Keywords: Festi, spam, botnet, rootkit, DDoS, OOP, HIPS, firewall](https://www.pdfsearch.io/img/769917d51b6e39dc600b00d3e99b97ea.jpg) | Add to Reading ListSource URL: www.eset.comLanguage: English - Date: 2012-11-27 10:18:00
|
---|
343![With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988 With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988](https://www.pdfsearch.io/img/218f713123e98e8fec3ef7b5f98ab24a.jpg) | Add to Reading ListSource URL: www.utdallas.eduLanguage: English - Date: 2004-04-05 18:42:25
|
---|
344![Int. J. Open Problems Compt. Math., Vol. 1, No. 2, September[removed]Computer Virus Strategies and Detection Int. J. Open Problems Compt. Math., Vol. 1, No. 2, September[removed]Computer Virus Strategies and Detection](https://www.pdfsearch.io/img/c428bb614a7a4217fd35b0494859d773.jpg) | Add to Reading ListSource URL: www.emis.deLanguage: English - Date: 2010-07-18 14:17:42
|
---|
345![Malware Analysis Report New C&C Protocol for ZeroAccess/Sirefef June 2012 Malware Analysis Report New C&C Protocol for ZeroAccess/Sirefef June 2012](https://www.pdfsearch.io/img/fcba0d8e8ce011d5323f750f177371fa.jpg) | Add to Reading ListSource URL: www.kindsight.netLanguage: English - Date: 2012-06-27 10:34:00
|
---|
346![Malware Analysis Report Botnet: ZeroAccess/Sirefef February 2012 Malware Analysis Report Botnet: ZeroAccess/Sirefef February 2012](https://www.pdfsearch.io/img/c8ddff0e4c8cc9a0637a64ee586eea1b.jpg) | Add to Reading ListSource URL: www.kindsight.netLanguage: English - Date: 2012-02-24 16:07:42
|
---|
347![THE VOHO CAMPAIGN: AN IN DEPTH ANALYSIS RSA FirstWatchSM Intelligence Report THE VOHO CAMPAIGN: AN IN DEPTH ANALYSIS RSA FirstWatchSM Intelligence Report](https://www.pdfsearch.io/img/7389c0fe7b7df7646948c204dd608654.jpg) | Add to Reading ListSource URL: blogs.rsa.comLanguage: English - Date: 2013-01-19 11:57:16
|
---|
348![Malware Analysis Analysis of a Malware Analysis Analysis of a](https://www.pdfsearch.io/img/ef410ba43f40fb7278f5a6c7d01f9d84.jpg) | Add to Reading ListSource URL: www.cs.ucsb.eduLanguage: English - Date: 2013-08-28 21:33:56
|
---|
349![Malware Analysis Analysis of a Botnet Takeover Malware Analysis Analysis of a Botnet Takeover](https://www.pdfsearch.io/img/b34d7a26cb4477fea34ca5e75b287e8d.jpg) | Add to Reading ListSource URL: www.cs.ucsb.eduLanguage: English - Date: 2011-02-11 11:42:37
|
---|