The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for botnet with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2003-2007 (32) 2008 (53) 2009 (57) 2010 (49) 2011 (44) 2012 (50) 2013 (52) 2014 (55) 2015 (58) 2016 (60) 2017 (76) 2018 (89) 2019 (79) 2020 (97) 2021 (104) 2022 (104) 2023 (93) 2024 (23)
Publication types (Num. hits)
article(461) book(2) data(2) incollection(17) inproceedings(681) phdthesis(12)
Venues (Conferences, Journals, ...)
CoRR(87) IEEE Access(27) Comput. Secur.(16) Sensors(16) Secur. Commun. Networks(14) GLOBECOM(13) Comput. Networks(12) ICC(10) ARES(9) CCS(9) MALWARE(9) AsiaCCS(8) Botnet Detection(8) J. Networks(8) DSC(7) ICCCNT(7) More (+10 of total 566)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 176 occurrences of 106 keywords

Results
Found 1175 publication records. Showing 1175 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
153Zonghua Zhang, Ruo Ando, Youki Kadobayashi Hardening Botnet by a Rational Botmaster. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF intrusion detection, Network security, malware, botnet
124Eung Jun Cho, Jin Ho Kim, Choong Seon Hong Attack Model and Detection Scheme for Botnet on 6LoWPAN. Search on Bibsonomy APNOMS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Botnet, 6LoWPAN, Attack Model
109Brent ByungHoon Kang, Eric Chan-Tin, Christopher P. Lee 0001, James Tyra, Hun Jeong Kang, Chris Nunnery, Zachariah Wadler, Greg Sinclair, Nicholas Hopper, David Dagon, Yongdae Kim Towards complete node enumeration in a peer-to-peer botnet. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF infected hosts enumeration, storm, P2P, botnet
108Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna Your botnet is my botnet: analysis of a botnet takeover. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF torpig, security, measurement, malware, botnet
103Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis A multifaceted approach to understanding the botnet phenomenon. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF network security, computer security, malware, botnets
94Juan Caballero, Pongsin Poosankam, Christian Kreibich, Dawn Xiaodong Song Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF botnet infiltration, protocol reverse engineering, binary analysis
89Elizabeth Van Ruitenbeek, William H. Sanders Modeling Peer-to-Peer Botnets. Search on Bibsonomy QEST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
89Daniel Ramsbrock, Xinyuan Wang 0005, Xuxian Jiang A First Step towards Live Botmaster Traceback. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
88Hyunsang Choi, Hanwoo Lee, Heejo Lee, Hyogon Kim Botnet Detection by Monitoring Group Activities in DNS Traffic. Search on Bibsonomy CIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
79Zhaosheng Zhu, Guohan Lu, Yan Chen 0004, Zhi (Judy) Fu, Phil Roberts, Keesook Han Botnet Research Survey. Search on Bibsonomy COMPSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Survey, Botnet
74W. Timothy Strayer, Robert Walsh, Carl Livadas, David E. Lapsley Detecting Botnets with Tight Command and Control. Search on Bibsonomy LCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
74Kapil Singh, Abhinav Srivastava, Jonathon T. Giffin, Wenke Lee Evaluating email's feasibility for botnet command and control. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
74Cliff Changchun Zou, Ryan Cunningham Honeypot-Aware Advanced Botnet Construction and Maintenance. Search on Bibsonomy DSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
64Wei Lu 0018, Mahbod Tavallaee, Ali A. Ghorbani 0001 Automatic discovery of botnet communities on large-scale communication networks. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF botnet detection, machine learning, traffic classification
64Abhinav Pathak, Feng Qian 0001, Y. Charlie Hu, Zhuoqing Morley Mao, Supranamaya Ranjan Botnet spam campaigns can be long lasting: evidence, implications, and analysis. Search on Bibsonomy SIGMETRICS/Performance The full citation details ... 2009 DBLP  DOI  BibTeX  RDF distributedness, open relay, spam campaign, botnet, burstiness
64Elizabeth Stinson, John C. Mitchell Characterizing Bots' Remote Control Behavior. Search on Bibsonomy Botnet Detection The full citation details ... 2008 DBLP  DOI  BibTeX  RDF host-based, behavior-based, taint, interposition, detection, system call
63David Dagon, Guofei Gu, Christopher P. Lee 0001 A Taxonomy of Botnet Structures. Search on Bibsonomy Botnet Detection The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
63Anirudh Ramachandran, Nick Feamster, David Dagon Detecting Botnet Membership with DNSBL Counterintelligence. Search on Bibsonomy Botnet Detection The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
63W. Timothy Strayer, David E. Lapsley, Robert Walsh, Carl Livadas Botnet Detection Based on Network Behavior. Search on Bibsonomy Botnet Detection The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
63Zhichun Li, Anup Goyal, Yan Chen 0004 Honeynet-based Botnet Scan Traffic Analysis. Search on Bibsonomy Botnet Detection The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
59Frédéric Giroire, Jaideep Chandrashekar, Nina Taft, Eve M. Schooler, Dina Papagiannaki Exploiting Temporal Persistence to Detect Covert Botnet Channels. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
59Bhavani Thuraisingham Data mining for security applications: Mining concept-drifting data streams to detect peer to peer botnet traffic. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
59Carl Livadas, Robert Walsh, David E. Lapsley, W. Timothy Strayer Using Machine Learning Techniques to Identify Botnet Traffic. Search on Bibsonomy LCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
50Anirudh Ramachandran, Nick Feamster Understanding the network-level behavior of spammers. Search on Bibsonomy SIGCOMM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, network management, spam, BGP, botnet
50Zhichun Li, Anup Goyal, Yan Chen 0004, Vern Paxson Automating analysis of large-scale botnet probing events. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF global property extrapolation, scan strategy inference, situational awareness, botnet, statistical inference, honeynet
49David Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Xiaodong Song, Heng Yin 0001 Automatically Identifying Trigger-based Behavior in Malware. Search on Bibsonomy Botnet Detection The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
49John Bambenek, Agnes Klus Botnets and Proactive System Defense. Search on Bibsonomy Botnet Detection The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
49Jason Franklin, Mark Luk, Jonathan M. McCune, Arvind Seshadri, Adrian Perrig, Leendert van Doorn Towards Sound Detection of Virtual Machines. Search on Bibsonomy Botnet Detection The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
44Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage Spamalytics: an empirical analysis of spam marketing conversion. Search on Bibsonomy Commun. ACM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
44Binbin Wang, Zhitang Li, Hao Tu, Jie Ma Measuring Peer-to-Peer Botnets Using Control Flow Stability. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
44Chwan-Hwa John Wu, Tong Liu Simulation for intrusion-resilient, DDoS-resistant authentication system (IDAS). Search on Bibsonomy SpringSim The full citation details ... 2008 DBLP  DOI  BibTeX  RDF computer network defense, authentication, network security, discrete event simulation, DDoS, intrusion
44Carlton R. Davis, Stephen Neville, José M. Fernandez 0001, Jean-Marc Robert 0001, John McHugh Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
44Brandon Shirley, Chad D. Mano A Model for Covert Botnet Communication in a Private Subnet. Search on Bibsonomy Networking The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
44Mitsuaki Akiyama, Takanori Kawamoto, Masayoshi Shimamura, Teruaki Yokoyama, Youki Kadobayashi, Suguru Yamaguchi A Proposal of Metrics for Botnet Detection Based on Its Cooperative Behavior. Search on Bibsonomy SAINT Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
44M. Patrick Collins, Timothy J. Shimeall, Sidney Faber, Jeff Janies, Rhiannon Weaver, Markus De Shon, Joseph B. Kadane Using uncleanliness to predict future botnet addresses. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF botnets, reputation management, blacklists
35Si-Yu Huang, Ching-Hao Mao, Hahn-Ming Lee Fast-flux service network detection based on spatial snapshot mechanism for delay-free detection. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF fast-flux service network (FFSN), content distribution network (CDN), Botnet, Bayesian network classifier
35Ricardo Villamarín-Salomón, José Carlos Brustoloni Bayesian bot detection based on DNS traffic similarity. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF intrusion detection, DNS, botnet, Bayesian method, bot
35Huidong Jin 0001, Olivier Y. de Vel, Ke Zhang, Nianjun Liu Knowledge Discovery from Honeypot Data for Monitoring Malicious Attacks. Search on Bibsonomy Australasian Conference on Artificial Intelligence The full citation details ... 2008 DBLP  DOI  BibTeX  RDF density-based cluster visualisation, honeypot data, Knowledge discovery, outlier detection, botnet, Internet security
35Kazuya Kuwabara, Hiroaki Kikuchi, Masato Terada, Masashi Fujiwara Heuristics for Detecting Botnet Coordinated Attacks. Search on Bibsonomy ARES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF network, Botnet
35Jian Gao, Yixian Yang, Kangfeng Zheng, Zhengming Hu Research of an Innovative P2P-Based Botnet. Search on Bibsonomy MVHI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF super node, ordinary node, P2P, botnet
35Tao Wang, Shun-Zheng Yu Centralized Botnet Detection by Traffic Aggregation. Search on Bibsonomy ISPA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Centralized Botnet, Command and Control(C&C), Similarity and Synchronization, Bot
35Chung-Huang Yang, Kuang-Li Ting Fast Deployment of Botnet Detection with Traffic Monitoring. Search on Bibsonomy IIH-MSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF botmaster, C&C server, ntop, botnet, bots
30Dmitry G. Korzun, Andrei V. Gurtov A local equilibrium model for P2P resource ranking. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Bill Lin 0001, Jun (Jim) Xu, Nan Hua, Hao Wang 0006, Haiquan (Chuck) Zhao A randomized interleaved DRAM architecture for the maintenance of exact statistics counters. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Sipat Triukose, Zhihua Wen, Michael Rabinovich Content delivery networks: how big is big enough? Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Alma Riska, Erik Riedel Evaluation of disk-level workloads at different time scales. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Justin Leonard, Shouhuai Xu, Ravi S. Sandhu A Framework for Understanding Botnets. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Ian Castle, Eimear Buckley The Automatic Discovery, Identification and Measurement of Botnets. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Husain Husna, Santi Phithakkitnukoon, Srikanth Palla, Ram Dantu Behavior analysis of spam botnets. Search on Bibsonomy COMSWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Napoleon Paxton, Gail-Joon Ahn, Bill Chu Towards Practical Framework for Collecting and Analyzing Network-Centric Attacks. Search on Bibsonomy IRI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Su Chang, Thomas E. Daniels P2P botnet detection using behavior clustering & statistical tests. Search on Bibsonomy AISec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF machine learning, network security, anomaly detection
29Felix Leder, Peter Martini NGBPA Next Generation BotNet Protocol Analysis. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Iván Sánchez Milara, Erno Kuusela, Sebastian Turpeinen, Juha Röning, Jukka Riekki Botnet-inspired architecture for interactive spaces. Search on Bibsonomy MUM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF architecture comparison, HCI, remote control, botnets, multimedia services, interactive spaces, IRC
29Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel, Engin Kirda Automatically Generating Models for Botnet Detection. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Chun Wei, Alan P. Sprague, Gary Warner Detection of networks blocks used by the Storm Worm botnet. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF data mining, spam, electronic mail, forensic analysis, cyber crime
28Shingo Yamaguchi Mesa-Based Simulator of Botnet Defense System and Impact Evaluation of Botnet Infection Rates. Search on Bibsonomy ICEIC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
28Dimitrios Georgoulias, Jens Myrup Pedersen, Alice Hutchings, Morten Falch, Emmanouil Vasilomanolakis In the Market for a Botnet? An In-Depth Analysis of Botnet-Related Listings on Darkweb Marketplaces. Search on Bibsonomy eCrime The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Koichi Kobayashi Markov Chain-Based Modeling of Malicious Botnet Spread for Botnet Defense Systems. Search on Bibsonomy SII The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Muhammad Aidiel Rachman Putra, Dandy Pramana Hostiadi, Tohari Ahmad Simultaneous Botnet Dataset Generator: A simulation tool for generating a botnet dataset with simultaneous attack characteristic. Search on Bibsonomy Softw. Impacts The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Shingo Yamaguchi, Daisuke Makihara On Resident Strategy for White-Hat Botnet in Botnet Defense System. Search on Bibsonomy ICCE-TW The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Xiaolu Zhang, Oren Upton, Nicole Lang Beebe, Kim-Kwang Raymond Choo IoT Botnet Forensics: A Comprehensive Digital Forensic Case Study on Mirai Botnet Servers. Search on Bibsonomy Digit. Investig. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Shingo Yamaguchi Botnet Defense System and Its Basic Strategy Against Malicious Botnet. Search on Bibsonomy ICCE-TW The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Takashi Yamanoue A Botnet Detecting Infrastructure Using a Beneficial Botnet. Search on Bibsonomy SIGUCCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Han-Wei Hsiao, Shih-Heng Tung, Ming-Hsiang Shih, Wen-Pei Sung Using Botnet structure to construct the communication system of a real-time monitoring platform: Botnet structure for real-time monitoring platform. Search on Bibsonomy ICNC-FSKD The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Zainab Abaid, Dilip Sarkar, Mohamed Ali Kâafar, Sanjay Jha 0001 The Early Bird Gets the Botnet: A Markov Chain Based Early Warning System for Botnet Attacks. Search on Bibsonomy LCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Aymen Hasan Rashid Al Awadi, Bahari Belaton Multi-phase IRC Botnet and Botnet Behavior Detection Model. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
28Xiang Cui, Lihua Yin, Shuyuan Jin, Zhiyu Hao, Shuhao Li Botnet spoofing: fighting botnet with itself. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Fariba Haddadi, Nur Zincir-Heywood Botnet Detection System Analysis on the Effect of Botnet Evolution and Feature Representation. Search on Bibsonomy GECCO (Companion) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Masood Khosroshahy, Mustafa K. Mehmet Ali, Dongyu Qiu Scomf and SComI botnet models: The cases of initial unhindered botnet expansion. Search on Bibsonomy CCECE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Julian L. Rrushi, Ehsan Mokhtari, Ali A. Ghorbani 0001 Estimating botnet virulence within mathematical models of botnet propagation dynamics. Search on Bibsonomy Comput. Secur. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Joan Calvet, Carlton R. Davis, José M. Fernandez 0001, Jean-Yves Marion, Pier-Luc St-Onge, Wadie Guizani, Pierre-Marc Bureau, Anil Somayaji The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Maryam Feily, Alireza Shahrestani, Sureswaran Ramadass A Survey of Botnet and Botnet Detection. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Noriaki Yoshikai, Shun-ichi Kurino, Ayako Komatsu, Daisuke Takagi, Masashi Ueda, Atsuo Inomata, Hideo Numata Experimental Research on Personal Awareness and Behavior for Information Security Protection. Search on Bibsonomy NBiS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF virus infection, DDos, normalcy bias, psychology, botnet, virtual game
21Jungsuk Song, Jumpei Shimamura, Masashi Eto, Daisuke Inoue, Koji Nakao Correlation Analysis between Spamming Botnets and Malware Infected Hosts. Search on Bibsonomy SAINT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF darknet, spam, malware, honeypot, botnet, correlation analysis
21Yukiko Sawaya, Ayumu Kubota, Yutaka Miyake Detection of Attackers in Services Using Anomalous Host Behavior Based on Traffic Flow Statistics. Search on Bibsonomy SAINT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF flow-based attacker detection, spam mail sending hosts, botnet, DDoS attack, NetFlow
21Yan Jia 0001, Runheng Li, Liang Gan, Guangqiang Chen IRC Botnets' Homology Identifying Method Based on Improved LB_PAA Distance of Communication Characteristic Curves. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF dynamic time warping distance, LB_PAA, communication, botnet, homologous
21Fang Yu 0002, Yinglian Xie, Qifa Ke SBotMiner: large scale search bot detection. Search on Bibsonomy WSDM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF botnet detection, search bot, search log analysis, web search, click fraud
21Basil AsSadhan, José M. F. Moura, David E. Lapsley, Christine E. Jones, W. Timothy Strayer Detecting Botnets Using Command and Control Traffic. Search on Bibsonomy NCA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Botnet detection, discrete time series analysis, periodogram, Walker large sample test, SLINGbot
21Chengcui Zhang, Wei-bang Chen, Xin Chen 0001, Gary Warner Revealing common sources of image spam by unsupervised clustering with visual features. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF clustering, computer forensics, botnet, image spam
21Yinglian Xie, Fang Yu 0002, Martín Abadi De-anonymizing the internet using unreliable IDs. Search on Bibsonomy SIGCOMM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF attack forensics, accountability, botnet, blacklist
21Van-Hau Pham, Marc Dacier Honeypot Traces Forensics: The Observation Viewpoint Matters. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF attack trace analysis, botnet detection, honeypot
21Keisuke Takemori, Masahiko Fujinaga, Toshiya Sayama, Masakatsu Nishigaki Host-based traceback; tracking bot and C&C server. Search on Bibsonomy ICUIMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF DNS reflection attack, host-based traceback, botnet, IP spoofing
21Lei Liu 0021, Songqing Chen, Guanhua Yan, Zhao Zhang 0010 BotTracer: Execution-Based Bot-Like Malware Detection. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF virtual machine, Botnet, malware detection
21Tao Peng 0002, Christopher Leckie, Kotagiri Ramamohanarao Survey of network-based defense mechanisms countering the DoS and DDoS problems. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF DNS reflector attack, bandwidth attack, resource management, DoS, DDoS, Botnet, Internet security, IP traceback, IRC, IP spoofing, SYN flood, VoIP security
21Bill McCarty Botnets: Big and Bigger. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF honeypot, botnet, honeynet
15Chengyu Song, Jianwei Zhuge, Xinhui Han, Zhiyuan Ye Preventing drive-by download via inter-module communication monitoring. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF inter-module communication, malicious script, intrusion detection, ActiveX, drive-by download
15Katerina J. Argyraki, David R. Cheriton Scalable network-layer defense against internet bandwidth-flooding attacks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF denial-of-service defenses, traffic filtering, network-level security and protection
15Peter Likarish, Eunjin Jung A targeted web crawling for building malicious javascript collection. Search on Bibsonomy CIKM-DSMM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF malicious javascript, security, web crawling
15Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent Jaeger, Patrick D. McDaniel, Thomas La Porta On cellular botnets: measuring the impact of malicious devices on a cellular network core. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF mobile phones, denial-of-service, telecommunications
15Ryan Farley, Xinyuan Wang 0005 Roving Bugnet: Distributed Surveillance Threat and Mitigation. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Justin Leonard, Shouhuai Xu, Ravi S. Sandhu A First Step towards Characterizing Stealthy Botnets. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Claudio Mazzariello, Carlo Sansone Anomaly-Based Detection of IRC Botnets by Means of One-Class Support Vector Classifiers. Search on Bibsonomy ICIAP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Tae Hwan Kim, Dong Seong Kim 0001, Sang Min Lee 0012, Jong Sou Park Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Traffic visualization, Weighted moving average, Intrusion detection, Distributed Denial of Service attacks, Traffic matrix, IP spoofing
15Jan Göbel, Thorsten Holz, Philipp Trinius Towards Proactive Spam Filtering (Extended Abstract). Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Paolo Milani Comparetti, Gilbert Wondracek, Christopher Krügel, Engin Kirda Prospex: Protocol Specification Extraction. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Mohammad M. Masud 0001, Jing Gao 0004, Latifur Khan, Jiawei Han 0001, Bhavani Thuraisingham A Multi-partition Multi-chunk Ensemble Technique to Classify Concept-Drifting Data Streams. Search on Bibsonomy PAKDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Lance Stout, Michael A. Murphy, Sebastien Goasguen Kestrel: an XMPP-based framework for many task computing applications. Search on Bibsonomy SC-MTAGS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cluster, scheduling, grid, distributed, XMPP, MTC
15Spyros Antonatos, Periklis Akritidis, Vinh The Lam, Kostas G. Anagnostakis Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Web security, malicious software, distributed attacks
15Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage Spamalytics: an empirical analysis of spam marketing conversion. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF unsolicited email, spam, conversion
15Aurélien Francillon, Claude Castelluccia Code injection attacks on harvard-architecture devices. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF harvard architecture, return oriented programming, wireless sensor networks, buffer overflow, embedded devices, computer worms, code injection attacks, gadgets
Displaying result #1 - #100 of 1175 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license