<--- Back to Details
First PageDocument Content
Computing / Cyberwarfare / Botnets / Computer network security / Multi-agent systems / Spamming / Concurrent computing / Domain generation algorithm / Malware / Sality / Denial-of-service attack / Computer virus
Date: 2014-09-29 02:03:52
Computing
Cyberwarfare
Botnets
Computer network security
Multi-agent systems
Spamming
Concurrent computing
Domain generation algorithm
Malware
Sality
Denial-of-service attack
Computer virus

AUTOPROBE: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis Zhaoyan Xu Antonio Nappa

Add to Reading List

Source URL: faculty.cs.tamu.edu

Download Document from Source Website

File Size: 625,56 KB

Share Document on Facebook

Similar Documents

SALITY 2003 – TODAY. PRESENTER: Peter Kleissner Botconf’15, 2-4 Dec 2015, Paris/France

SALITY 2003 – TODAY. PRESENTER: Peter Kleissner Botconf’15, 2-4 Dec 2015, Paris/France

DocID: 1taNY - View Document

March 2015 Feature Article: 50 Shades of Security Table of Contents 50 Shades of Security .................................................................................................................................

March 2015 Feature Article: 50 Shades of Security Table of Contents 50 Shades of Security .................................................................................................................................

DocID: 1pqlN - View Document

September 2015 Feature Article: Watching the Furby Fly Table of Contents Watching the Furby Fly............................................................................................................................

September 2015 Feature Article: Watching the Furby Fly Table of Contents Watching the Furby Fly............................................................................................................................

DocID: 1oQIq - View Document

September 2015 Feature Article: Watching the Furby Fly Table of Contents Watching the Furby Fly............................................................................................................................

September 2015 Feature Article: Watching the Furby Fly Table of Contents Watching the Furby Fly............................................................................................................................

DocID: 1oHsh - View Document

March 2015 Feature Article: 50 Shades of Security Table of Contents 50 Shades of Security .................................................................................................................................

March 2015 Feature Article: 50 Shades of Security Table of Contents 50 Shades of Security .................................................................................................................................

DocID: 1oBlX - View Document