Storm Worm

Results: 42



#Item
1Spamming / Computing / Computer network security / Multi-agent systems / Botnets / Concurrent computing / Command and control / Storm Worm / Email spam / Storm botnet / Kelihos botnet

Challenges in Experimenting with Botnet Detection Systems Adam J. Aviv Andreas Haeberlen University of Pennsylvania Abstract

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-07-08 13:42:23
2

HiNRG Technical Report: Measuring the Storm Worm Network Sandeep Sarat Andreas Terzis

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2007-11-09 10:57:13
    3Spamming / Statistics / Botnets / Bots / Storm botnet / Internet bot / Cluster analysis / Storm Worm / Hierarchical clustering / Computer network security / Computing / Multi-agent systems

    BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu† , Roberto Perdisci‡ , Junjie Zhang† , and Wenke Lee† † College of Computing, Georgia Institut

    Add to Reading List

    Source URL: www.usenix.org

    Language: English - Date: 2008-07-14 18:18:35
    4Computer virus / Mydoom / Zotob / Macro virus / Storm Worm / Computer worms / Malware / System software / W32

    Attachment 1 Computer Virus Incident Report for SeptemberVirus Detection Count by Month 2. Virus Report Count by Month

    Add to Reading List

    Source URL: www.ipa.go.jp

    Language: English - Date: 2013-05-23 07:51:49
    5Spyware / Computer worms / Agobot / W32 / Backdoor / Kaspersky Lab / Keystroke logging / Storm Worm / Insurrection / Malware / System software / Espionage

    Hacking in a Foreign Language: A Network Security Guide to Russia Kenneth Geers CISSP

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2015-05-28 15:51:35
    6Computer virus / Zotob / Mydoom / SQL Slammer / Storm Worm / Macro virus / Computer worms / Malware / System software / W32

    Attachment 1 Computer Virus Incident Report for NovemberVirus Detection Count by Month 2. Virus Report Count by Month

    Add to Reading List

    Source URL: www.ipa.go.jp

    Language: English - Date: 2013-05-23 07:51:49
    7Multi-agent systems / Spamming / Cyberwarfare / Storm botnet / Storm Worm / Zombie / Waledac botnet / Torpig / Zeus / Computer network security / Computing / Botnets

    – Survey and Taxonomy of Botnet Research through Life-cycle ´ RAFAEL A. RODR´IGUEZ-GOMEZ , University of Granada ´

    Add to Reading List

    Source URL: wdb.ugr.es

    Language: English - Date: 2013-09-30 02:59:52
    8Spamming / Botnets / Internet Relay Chat / Storm botnet / Peer-to-peer / Internet Relay Chat bot / Fast flux / Denial-of-service attack / Storm Worm / Computing / Computer network security / Multi-agent systems

    Discovery techniques for P2P botnets David Dittrich Applied Physics Laboratory University of Washington

    Add to Reading List

    Source URL: jjcweb.jjay.cuny.edu

    Language: English - Date: 2014-12-03 00:00:08
    9Spamming / Cyberwarfare / Botnets / Denial-of-service attacks / Denial-of-service attack / Fast flux / Storm Worm / Agobot / Internet Relay Chat / Computer network security / Computing / Multi-agent systems

    Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods Elizabeth Stinson Stanford University John C. Mitchell

    Add to Reading List

    Source URL: theory.stanford.edu

    Language: English - Date: 2010-03-09 22:02:42
    10Spamming / Botnets / Concurrent computing / File sharing networks / Peer-to-peer / Storm botnet / Storm Worm / Connectivity / Topology / Multi-agent systems / Computing / Computer network security

    2010 ACSAC Proceedings - Papers

    Add to Reading List

    Source URL: jjcweb.jjay.cuny.edu

    Language: English - Date: 2014-12-03 00:02:54
    UPDATE