First Page | Document Content | |
---|---|---|
Date: 2017-05-12 09:17:38Concurrent computing Computer network security Multi-agent systems Spamming Computing Cybercrime Distributed computing Malware Botnet Peer-to-peer Social peer-to-peer processes | Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2 Institute of Information Engineering, Chinese Academy of SciencesAdd to Reading ListSource URL: www.ieee-security.orgDownload Document from Source WebsiteFile Size: 376,41 KBShare Document on Facebook |
TESTIMONY OF Kathryn Haun Rodriguez Former Assistant U.S. Attorney, U.S. Department of Justice, Lecturer in Law on Cybercrime and Digital Currency, Stanford University Current Member of the Board of Directors, CoinbaseDocID: 1xU9h - View Document | |
Cybercrime After the Sunrise: A Statistical Analysis of DNS Abuse in New gTLDsDocID: 1vr3e - View Document | |
Fighting Cybercrime with Packet Attestation Andreas Haeberlen University of Pennsylvania Pedro FonsecaDocID: 1vn3h - View Document | |
I N D U S T RY S O LUT ION BR I E F Malwarebytes for Finance Preventing and remediating financial cybercrimeDocID: 1vm3f - View Document | |
THE FACTS : NEW ZEALAND CYBERCRIME INDocID: 1vex1 - View Document |