|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 176 occurrences of 106 keywords
|
|
|
Results
Found 1175 publication records. Showing 1175 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
153 | Zonghua Zhang, Ruo Ando, Youki Kadobayashi |
Hardening Botnet by a Rational Botmaster. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 348-369, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
intrusion detection, Network security, malware, botnet |
124 | Eung Jun Cho, Jin Ho Kim, Choong Seon Hong |
Attack Model and Detection Scheme for Botnet on 6LoWPAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: Management Enabling the Future Internet for Changing Business and New Computing Services, 12th Asia-Pacific Network Operations and Management Symposium, APNOMS 2009, Jeju, South Korea, September 23-25, 2009, Proceedings, pp. 515-518, 2009, Springer, 978-3-642-04491-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Botnet, 6LoWPAN, Attack Model |
109 | Brent ByungHoon Kang, Eric Chan-Tin, Christopher P. Lee 0001, James Tyra, Hun Jeong Kang, Chris Nunnery, Zachariah Wadler, Greg Sinclair, Nicholas Hopper, David Dagon, Yongdae Kim |
Towards complete node enumeration in a peer-to-peer botnet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 23-34, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
infected hosts enumeration, storm, P2P, botnet |
108 | Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna |
Your botnet is my botnet: analysis of a botnet takeover. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 635-647, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
torpig, security, measurement, malware, botnet |
103 | Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis |
A multifaceted approach to understanding the botnet phenomenon. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, IMC 2006, Rio de Janeriro, Brazil, October 25-27, 2006, pp. 41-52, 2006, ACM, 1-59593-561-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
network security, computer security, malware, botnets |
94 | Juan Caballero, Pongsin Poosankam, Christian Kreibich, Dawn Xiaodong Song |
Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 621-634, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
botnet infiltration, protocol reverse engineering, binary analysis |
89 | Elizabeth Van Ruitenbeek, William H. Sanders |
Modeling Peer-to-Peer Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QEST ![In: Fifth International Conference on the Quantitative Evaluaiton of Systems (QEST 2008), 14-17 September 2008, Saint-Malo, France, pp. 307-316, 2008, IEEE Computer Society, 978-0-7695-3360-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
89 | Daniel Ramsbrock, Xinyuan Wang 0005, Xuxian Jiang |
A First Step towards Live Botmaster Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 59-77, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
88 | Hyunsang Choi, Hanwoo Lee, Heejo Lee, Hyogon Kim |
Botnet Detection by Monitoring Group Activities in DNS Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: Seventh International Conference on Computer and Information Technology (CIT 2007), October 16-19, 2007, University of Aizu, Fukushima, Japan, pp. 715-720, 2007, IEEE Computer Society, 978-0-7695-2983-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
79 | Zhaosheng Zhu, Guohan Lu, Yan Chen 0004, Zhi (Judy) Fu, Phil Roberts, Keesook Han |
Botnet Research Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2008, 28 July - 1 August 2008, Turku, Finland, pp. 967-972, 2008, IEEE Computer Society, 978-0-7695-3262-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Survey, Botnet |
74 | W. Timothy Strayer, Robert Walsh, Carl Livadas, David E. Lapsley |
Detecting Botnets with Tight Command and Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: LCN 2006, The 31st Annual IEEE Conference on Local Computer Networks, Tampa, Florida, USA, 14-16 November 2006, pp. 195-202, 2006, IEEE Computer Society, 1-4244-0418-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
74 | Kapil Singh, Abhinav Srivastava, Jonathon T. Giffin, Wenke Lee |
Evaluating email's feasibility for botnet command and control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: The 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2008, June 24-27, 2008, Anchorage, Alaska, USA, Proceedings, pp. 376-385, 2008, IEEE Computer Society, 978-1-4244-2397-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
74 | Cliff Changchun Zou, Ryan Cunningham |
Honeypot-Aware Advanced Botnet Construction and Maintenance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2006 International Conference on Dependable Systems and Networks (DSN 2006), 25-28 June 2006, Philadelphia, Pennsylvania, USA, Proceedings, pp. 199-208, 2006, IEEE Computer Society, 0-7695-2607-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
64 | Wei Lu 0018, Mahbod Tavallaee, Ali A. Ghorbani 0001 |
Automatic discovery of botnet communities on large-scale communication networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 1-10, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
botnet detection, machine learning, traffic classification |
64 | Abhinav Pathak, Feng Qian 0001, Y. Charlie Hu, Zhuoqing Morley Mao, Supranamaya Ranjan |
Botnet spam campaigns can be long lasting: evidence, implications, and analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS/Performance ![In: Proceedings of the Eleventh International Joint Conference on Measurement and Modeling of Computer Systems, SIGMETRICS/Performance 2009, Seattle, WA, USA, June 15-19, 2009, pp. 13-24, 2009, ACM, 978-1-60558-511-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
distributedness, open relay, spam campaign, botnet, burstiness |
64 | Elizabeth Stinson, John C. Mitchell |
Characterizing Bots' Remote Control Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Botnet Detection ![In: Botnet Detection: Countering the Largest Security Threat, pp. 45-64, 2008, Springer, 978-0-387-68768-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
host-based, behavior-based, taint, interposition, detection, system call |
63 | David Dagon, Guofei Gu, Christopher P. Lee 0001 |
A Taxonomy of Botnet Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Botnet Detection ![In: Botnet Detection: Countering the Largest Security Threat, pp. 143-164, 2008, Springer, 978-0-387-68768-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
63 | Anirudh Ramachandran, Nick Feamster, David Dagon |
Detecting Botnet Membership with DNSBL Counterintelligence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Botnet Detection ![In: Botnet Detection: Countering the Largest Security Threat, pp. 131-142, 2008, Springer, 978-0-387-68768-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
63 | W. Timothy Strayer, David E. Lapsley, Robert Walsh, Carl Livadas |
Botnet Detection Based on Network Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Botnet Detection ![In: Botnet Detection: Countering the Largest Security Threat, pp. 1-24, 2008, Springer, 978-0-387-68768-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
63 | Zhichun Li, Anup Goyal, Yan Chen 0004 |
Honeynet-based Botnet Scan Traffic Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Botnet Detection ![In: Botnet Detection: Countering the Largest Security Threat, pp. 25-44, 2008, Springer, 978-0-387-68768-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
59 | Frédéric Giroire, Jaideep Chandrashekar, Nina Taft, Eve M. Schooler, Dina Papagiannaki |
Exploiting Temporal Persistence to Detect Covert Botnet Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings, pp. 326-345, 2009, Springer, 978-3-642-04341-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
59 | Bhavani Thuraisingham |
Data mining for security applications: Mining concept-drifting data streams to detect peer to peer botnet traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings, 2008, IEEE, 978-1-4244-2414-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
59 | Carl Livadas, Robert Walsh, David E. Lapsley, W. Timothy Strayer |
Using Machine Learning Techniques to Identify Botnet Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: LCN 2006, The 31st Annual IEEE Conference on Local Computer Networks, Tampa, Florida, USA, 14-16 November 2006, pp. 967-974, 2006, IEEE Computer Society, 1-4244-0418-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
50 | Anirudh Ramachandran, Nick Feamster |
Understanding the network-level behavior of spammers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Pisa, Italy, September 11-15, 2006, pp. 291-302, 2006, ACM, 1-59593-308-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, network management, spam, BGP, botnet |
50 | Zhichun Li, Anup Goyal, Yan Chen 0004, Vern Paxson |
Automating analysis of large-scale botnet probing events. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 11-22, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
global property extrapolation, scan strategy inference, situational awareness, botnet, statistical inference, honeynet |
49 | David Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Xiaodong Song, Heng Yin 0001 |
Automatically Identifying Trigger-based Behavior in Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Botnet Detection ![In: Botnet Detection: Countering the Largest Security Threat, pp. 65-88, 2008, Springer, 978-0-387-68768-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
49 | John Bambenek, Agnes Klus |
Botnets and Proactive System Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Botnet Detection ![In: Botnet Detection: Countering the Largest Security Threat, pp. 117-130, 2008, Springer, 978-0-387-68768-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
49 | Jason Franklin, Mark Luk, Jonathan M. McCune, Arvind Seshadri, Adrian Perrig, Leendert van Doorn |
Towards Sound Detection of Virtual Machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Botnet Detection ![In: Botnet Detection: Countering the Largest Security Threat, pp. 89-116, 2008, Springer, 978-0-387-68768-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage |
Spamalytics: an empirical analysis of spam marketing conversion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 52(9), pp. 99-107, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
44 | Binbin Wang, Zhitang Li, Hao Tu, Jie Ma |
Measuring Peer-to-Peer Botnets Using Control Flow Stability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 663-669, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
44 | Chwan-Hwa John Wu, Tong Liu |
Simulation for intrusion-resilient, DDoS-resistant authentication system (IDAS). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpringSim ![In: Proceedings of the 2008 Spring Simulation Multiconference, SpringSim 2008, Ottawa, Canada, April 14-17, 2008, pp. 844-851, 2008, SCS/ACM, 1-56555-319-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
computer network defense, authentication, network security, discrete event simulation, DDoS, intrusion |
44 | Carlton R. Davis, Stephen Neville, José M. Fernandez 0001, Jean-Marc Robert 0001, John McHugh |
Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings, pp. 461-480, 2008, Springer, 978-3-540-88312-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Brandon Shirley, Chad D. Mano |
A Model for Covert Botnet Communication in a Private Subnet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networking ![In: NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet , 7th International IFIP-TC6 Networking Conference, Singapore, May 5-9, 2008, Proceedings, pp. 624-632, 2008, Springer, 978-3-540-79548-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Mitsuaki Akiyama, Takanori Kawamoto, Masayoshi Shimamura, Teruaki Yokoyama, Youki Kadobayashi, Suguru Yamaguchi |
A Proposal of Metrics for Botnet Detection Based on Its Cooperative Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT Workshops ![In: 2007 International Symposium on Applications and the Internet - Workshops (SAINT 2007 Workshops), 15-19 January 2007, Hiroshima, Japan, pp. 82, 2007, IEEE Computer Society, 0-7695-2757-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
44 | M. Patrick Collins, Timothy J. Shimeall, Sidney Faber, Jeff Janies, Rhiannon Weaver, Markus De Shon, Joseph B. Kadane |
Using uncleanliness to predict future botnet addresses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, IMC 2007, San Diego, California, USA, October 24-26, 2007, pp. 93-104, 2007, ACM, 978-1-59593-908-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
botnets, reputation management, blacklists |
35 | Si-Yu Huang, Ching-Hao Mao, Hahn-Ming Lee |
Fast-flux service network detection based on spatial snapshot mechanism for delay-free detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010, pp. 101-111, 2010, ACM, 978-1-60558-936-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
fast-flux service network (FFSN), content distribution network (CDN), Botnet, Bayesian network classifier |
35 | Ricardo Villamarín-Salomón, José Carlos Brustoloni |
Bayesian bot detection based on DNS traffic similarity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009, pp. 2035-2041, 2009, ACM, 978-1-60558-166-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
intrusion detection, DNS, botnet, Bayesian method, bot |
35 | Huidong Jin 0001, Olivier Y. de Vel, Ke Zhang, Nianjun Liu |
Knowledge Discovery from Honeypot Data for Monitoring Malicious Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australasian Conference on Artificial Intelligence ![In: AI 2008: Advances in Artificial Intelligence, 21st Australasian Joint Conference on Artificial Intelligence, Auckland, New Zealand, December 1-5, 2008. Proceedings, pp. 470-481, 2008, Springer, 978-3-540-89377-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
density-based cluster visualisation, honeypot data, Knowledge discovery, outlier detection, botnet, Internet security |
35 | Kazuya Kuwabara, Hiroaki Kikuchi, Masato Terada, Masashi Fujiwara |
Heuristics for Detecting Botnet Coordinated Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: ARES 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland, pp. 603-607, 2010, IEEE Computer Society, 978-0-7695-3965-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
network, Botnet |
35 | Jian Gao, Yixian Yang, Kangfeng Zheng, Zhengming Hu |
Research of an Innovative P2P-Based Botnet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MVHI ![In: 2010 International Conference on Machine Vision and Human-machine Interface, MVHI 2010, Kaifeng, China, April 24-25, 2010, pp. 214-218, 2010, IEEE Computer Soceity, 978-0-7695-4009-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
super node, ordinary node, P2P, botnet |
35 | Tao Wang, Shun-Zheng Yu |
Centralized Botnet Detection by Traffic Aggregation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA ![In: IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2009, Chengdu, Sichuan, China, 10-12 August 2009, pp. 86-93, 2009, IEEE Computer Society, 978-0-7695-3747-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Centralized Botnet, Command and Control(C&C), Similarity and Synchronization, Bot |
35 | Chung-Huang Yang, Kuang-Li Ting |
Fast Deployment of Botnet Detection with Traffic Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), Kyoto, Japan, 12-14 September, 2009, Proceedings, pp. 856-860, 2009, IEEE Computer Society, 978-1-4244-4717-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
botmaster, C&C server, ntop, botnet, bots |
30 | Dmitry G. Korzun, Andrei V. Gurtov |
A local equilibrium model for P2P resource ranking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS Perform. Evaluation Rev. ![In: SIGMETRICS Perform. Evaluation Rev. 37(2), pp. 27-29, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Bill Lin 0001, Jun (Jim) Xu, Nan Hua, Hao Wang 0006, Haiquan (Chuck) Zhao |
A randomized interleaved DRAM architecture for the maintenance of exact statistics counters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS Perform. Evaluation Rev. ![In: SIGMETRICS Perform. Evaluation Rev. 37(2), pp. 53-54, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Sipat Triukose, Zhihua Wen, Michael Rabinovich |
Content delivery networks: how big is big enough? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS Perform. Evaluation Rev. ![In: SIGMETRICS Perform. Evaluation Rev. 37(2), pp. 59-60, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Alma Riska, Erik Riedel |
Evaluation of disk-level workloads at different time scales. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS Perform. Evaluation Rev. ![In: SIGMETRICS Perform. Evaluation Rev. 37(2), pp. 67-68, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Justin Leonard, Shouhuai Xu, Ravi S. Sandhu |
A Framework for Understanding Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 917-922, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Ian Castle, Eimear Buckley |
The Automatic Discovery, Identification and Measurement of Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008, August 25-31, 2008, Cap Esterel, France, pp. 127-132, 2008, IEEE Computer Society, 978-0-7695-3329-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Husain Husna, Santi Phithakkitnukoon, Srikanth Palla, Ram Dantu |
Behavior analysis of spam botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMSWARE ![In: Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), January 5-10, 2008, Bangalore, India, pp. 246-253, 2008, IEEE, 978-1-4244-1797-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Napoleon Paxton, Gail-Joon Ahn, Bill Chu |
Towards Practical Framework for Collecting and Analyzing Network-Centric Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IRI ![In: Proceedings of the IEEE International Conference on Information Reuse and Integration, IRI 2007, 13-15 August 2007, Las Vegas, Nevada, USA, pp. 73-78, 2007, IEEE Systems, Man, and Cybernetics Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Su Chang, Thomas E. Daniels |
P2P botnet detection using behavior clustering & statistical tests. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009, pp. 23-30, 2009, ACM, 978-1-60558-781-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
machine learning, network security, anomaly detection |
29 | Felix Leder, Peter Martini |
NGBPA Next Generation BotNet Protocol Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings, pp. 307-317, 2009, Springer, 978-3-642-01243-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Iván Sánchez Milara, Erno Kuusela, Sebastian Turpeinen, Juha Röning, Jukka Riekki |
Botnet-inspired architecture for interactive spaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MUM ![In: Proceedings of the 8th International Conference on Mobile and Ubiquitous Multimedia, MUM 2009, Cambridge, United Kingdom, November 22-25, 2009, 2009, ACM, 978-1-60558-846-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
architecture comparison, HCI, remote control, botnets, multimedia services, interactive spaces, IRC |
29 | Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel, Engin Kirda |
Automatically Generating Models for Botnet Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 232-249, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Chun Wei, Alan P. Sprague, Gary Warner |
Detection of networks blocks used by the Storm Worm botnet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 46th Annual Southeast Regional Conference, 2008, Auburn, Alabama, USA, March 28-29, 2008, pp. 356-360, 2008, ACM, 978-1-60558-105-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
data mining, spam, electronic mail, forensic analysis, cyber crime |
28 | Shingo Yamaguchi |
Mesa-Based Simulator of Botnet Defense System and Impact Evaluation of Botnet Infection Rates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEIC ![In: International Conference on Electronics, Information, and Communication, ICEIC 2024, Taipei, Taiwan, January 28-31, 2024, pp. 1-5, 2024, IEEE, 979-8-3503-7188-8. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Dimitrios Georgoulias, Jens Myrup Pedersen, Alice Hutchings, Morten Falch, Emmanouil Vasilomanolakis |
In the Market for a Botnet? An In-Depth Analysis of Botnet-Related Listings on Darkweb Marketplaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: APWG Symposium on Electronic Crime Research, eCrime 2023, Barcelona, Spain, November 15-17, 2023, pp. 1-14, 2023, IEEE, 979-8-3503-6027-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Koichi Kobayashi |
Markov Chain-Based Modeling of Malicious Botnet Spread for Botnet Defense Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SII ![In: IEEE/SICE International Symposium on System Integration, SII 2023, Atlanta, GA, USA, January 17-20, 2023, pp. 1-5, 2023, IEEE, 979-8-3503-9868-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Muhammad Aidiel Rachman Putra, Dandy Pramana Hostiadi, Tohari Ahmad |
Simultaneous Botnet Dataset Generator: A simulation tool for generating a botnet dataset with simultaneous attack characteristic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Softw. Impacts ![In: Softw. Impacts 14, pp. 100441, December 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Shingo Yamaguchi, Daisuke Makihara |
On Resident Strategy for White-Hat Botnet in Botnet Defense System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCE-TW ![In: IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2022, Taipei, Taiwan, July 6-8, 2022, pp. 189-190, 2022, IEEE, 978-1-6654-7050-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Xiaolu Zhang, Oren Upton, Nicole Lang Beebe, Kim-Kwang Raymond Choo |
IoT Botnet Forensics: A Comprehensive Digital Forensic Case Study on Mirai Botnet Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digit. Investig. ![In: Digit. Investig. 32 Supplement, pp. 300926, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Shingo Yamaguchi |
Botnet Defense System and Its Basic Strategy Against Malicious Botnet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCE-TW ![In: IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2020, Taoyuan, Taiwan, September 28-30, 2020, pp. 1-2, 2020, IEEE, 978-1-7281-7399-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Takashi Yamanoue |
A Botnet Detecting Infrastructure Using a Beneficial Botnet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 2018 ACM SIGUCCS Annual Conference, SIGUCCS 2018, Orlando, FL, USA, October 7-10, 2018, pp. 35-42, 2018, ACM, 978-1-4503-5582-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Han-Wei Hsiao, Shih-Heng Tung, Ming-Hsiang Shih, Wen-Pei Sung |
Using Botnet structure to construct the communication system of a real-time monitoring platform: Botnet structure for real-time monitoring platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNC-FSKD ![In: 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, ICNC-FSKD 2017, Guilin, China, July 29-31, 2017, pp. 2860-2865, 2017, IEEE, 978-1-5386-2165-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Zainab Abaid, Dilip Sarkar, Mohamed Ali Kâafar, Sanjay Jha 0001 |
The Early Bird Gets the Botnet: A Markov Chain Based Early Warning System for Botnet Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 41st IEEE Conference on Local Computer Networks, LCN 2016, Dubai, United Arab Emirates, November 7-10, 2016, pp. 61-68, 2016, IEEE Computer Society, 978-1-5090-2054-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Aymen Hasan Rashid Al Awadi, Bahari Belaton |
Multi-phase IRC Botnet and Botnet Behavior Detection Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1501.03241, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
28 | Xiang Cui, Lihua Yin, Shuyuan Jin, Zhiyu Hao, Shuhao Li |
Botnet spoofing: fighting botnet with itself. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 8(1), pp. 80-89, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Fariba Haddadi, Nur Zincir-Heywood |
Botnet Detection System Analysis on the Effect of Botnet Evolution and Feature Representation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO (Companion) ![In: Genetic and Evolutionary Computation Conference, GECCO 2015, Madrid, Spain, July 11-15, 2015, Companion Material Proceedings, pp. 893-900, 2015, ACM, 978-1-4503-3488-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Masood Khosroshahy, Mustafa K. Mehmet Ali, Dongyu Qiu |
Scomf and SComI botnet models: The cases of initial unhindered botnet expansion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: 25th IEEE Canadian Conference on Electrical and Computer Engineering, CCECE 2012, Montreal, QC, Canada, April 29 - May 2, 2012, pp. 1-5, 2012, IEEE, 978-1-4673-1431-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Julian L. Rrushi, Ehsan Mokhtari, Ali A. Ghorbani 0001 |
Estimating botnet virulence within mathematical models of botnet propagation dynamics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 30(8), pp. 791-802, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Joan Calvet, Carlton R. Davis, José M. Fernandez 0001, Jean-Yves Marion, Pier-Luc St-Onge, Wadie Guizani, Pierre-Marc Bureau, Anil Somayaji |
The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 141-150, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Maryam Feily, Alireza Shahrestani, Sureswaran Ramadass |
A Survey of Botnet and Botnet Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 268-273, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Noriaki Yoshikai, Shun-ichi Kurino, Ayako Komatsu, Daisuke Takagi, Masashi Ueda, Atsuo Inomata, Hideo Numata |
Experimental Research on Personal Awareness and Behavior for Information Security Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NBiS ![In: The 14th International Conference on Network-Based Information Systems, NBiS 2011, Tirana, Albania, September 7-9, 2011, pp. 213-220, 2011, IEEE Computer Society, 978-1-4577-0789-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
virus infection, DDos, normalcy bias, psychology, botnet, virtual game |
21 | Jungsuk Song, Jumpei Shimamura, Masashi Eto, Daisuke Inoue, Koji Nakao |
Correlation Analysis between Spamming Botnets and Malware Infected Hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: 11th Annual International Symposium on Applications and the Internet, SAINT 2011, Munich, Germany, 18-21 July, 2011, Proceedings, pp. 372-375, 2011, IEEE Computer Society, 978-1-4577-0531-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
darknet, spam, malware, honeypot, botnet, correlation analysis |
21 | Yukiko Sawaya, Ayumu Kubota, Yutaka Miyake |
Detection of Attackers in Services Using Anomalous Host Behavior Based on Traffic Flow Statistics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: 11th Annual International Symposium on Applications and the Internet, SAINT 2011, Munich, Germany, 18-21 July, 2011, Proceedings, pp. 353-359, 2011, IEEE Computer Society, 978-1-4577-0531-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
flow-based attacker detection, spam mail sending hosts, botnet, DDoS attack, NetFlow |
21 | Yan Jia 0001, Runheng Li, Liang Gan, Guangqiang Chen |
IRC Botnets' Homology Identifying Method Based on Improved LB_PAA Distance of Communication Characteristic Curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IITSI ![In: Third International Symposium on Intelligent Information Technology and Security Informatics, IITSI 2010, Jinggangshan, China, April 2-4, 2010, pp. 360-365, 2010, IEEE Computer Society, 978-0-7695-4020-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
dynamic time warping distance, LB_PAA, communication, botnet, homologous |
21 | Fang Yu 0002, Yinglian Xie, Qifa Ke |
SBotMiner: large scale search bot detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSDM ![In: Proceedings of the Third International Conference on Web Search and Web Data Mining, WSDM 2010, New York, NY, USA, February 4-6, 2010, pp. 421-430, 2010, ACM, 978-1-60558-889-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
botnet detection, search bot, search log analysis, web search, click fraud |
21 | Basil AsSadhan, José M. F. Moura, David E. Lapsley, Christine E. Jones, W. Timothy Strayer |
Detecting Botnets Using Command and Control Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, NCA 2009, July 9-11, 2009, Cambridge, Massachusetts, USA, pp. 156-162, 2009, IEEE Computer Society, 978-0-7695-3698-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Botnet detection, discrete time series analysis, periodogram, Walker large sample test, SLINGbot |
21 | Chengcui Zhang, Wei-bang Chen, Xin Chen 0001, Gary Warner |
Revealing common sources of image spam by unsupervised clustering with visual features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009, pp. 891-892, 2009, ACM, 978-1-60558-166-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
clustering, computer forensics, botnet, image spam |
21 | Yinglian Xie, Fang Yu 0002, Martín Abadi |
De-anonymizing the internet using unreliable IDs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2009 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Barcelona, Spain, August 16-21, 2009, pp. 75-86, 2009, ACM, 978-1-60558-594-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
attack forensics, accountability, botnet, blacklist |
21 | Van-Hau Pham, Marc Dacier |
Honeypot Traces Forensics: The Observation Viewpoint Matters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 365-372, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
attack trace analysis, botnet detection, honeypot |
21 | Keisuke Takemori, Masahiko Fujinaga, Toshiya Sayama, Masakatsu Nishigaki |
Host-based traceback; tracking bot and C&C server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUIMC ![In: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC 2009, Suwon, Korea, January 15-16, 2009, pp. 400-405, 2009, ACM, 978-1-60558-405-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
DNS reflection attack, host-based traceback, botnet, IP spoofing |
21 | Lei Liu 0021, Songqing Chen, Guanhua Yan, Zhao Zhang 0010 |
BotTracer: Execution-Based Bot-Like Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 97-113, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
virtual machine, Botnet, malware detection |
21 | Tao Peng 0002, Christopher Leckie, Kotagiri Ramamohanarao |
Survey of network-based defense mechanisms countering the DoS and DDoS problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Comput. Surv. ![In: ACM Comput. Surv. 39(1), pp. 3, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
DNS reflector attack, bandwidth attack, resource management, DoS, DDoS, Botnet, Internet security, IP traceback, IRC, IP spoofing, SYN flood, VoIP security |
21 | Bill McCarty |
Botnets: Big and Bigger. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 1(4), pp. 87-90, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
honeypot, botnet, honeynet |
15 | Chengyu Song, Jianwei Zhuge, Xinhui Han, Zhiyuan Ye |
Preventing drive-by download via inter-module communication monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010, pp. 124-134, 2010, ACM, 978-1-60558-936-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
inter-module communication, malicious script, intrusion detection, ActiveX, drive-by download |
15 | Katerina J. Argyraki, David R. Cheriton |
Scalable network-layer defense against internet bandwidth-flooding attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 17(4), pp. 1284-1297, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
denial-of-service defenses, traffic filtering, network-level security and protection |
15 | Peter Likarish, Eunjin Jung |
A targeted web crawling for building malicious javascript collection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM-DSMM ![In: Proceeding of the ACM First International Workshop on Data-Intensive Software Management and Mining, CIKM-DSMM 2009, Hong Kong, China, November 6, 2009, pp. 23-26, 2009, ACM, 978-1-60558-810-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
malicious javascript, security, web crawling |
15 | Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent Jaeger, Patrick D. McDaniel, Thomas La Porta |
On cellular botnets: measuring the impact of malicious devices on a cellular network core. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 223-234, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
mobile phones, denial-of-service, telecommunications |
15 | Ryan Farley, Xinyuan Wang 0005 |
Roving Bugnet: Distributed Surveillance Threat and Mitigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings, pp. 39-50, 2009, Springer, 978-3-642-01243-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Justin Leonard, Shouhuai Xu, Ravi S. Sandhu |
A First Step towards Characterizing Stealthy Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 106-113, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Claudio Mazzariello, Carlo Sansone |
Anomaly-Based Detection of IRC Botnets by Means of One-Class Support Vector Classifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIAP ![In: Image Analysis and Processing - ICIAP 2009, 15th International Conference Vietri sul Mare, Italy, September 8-11, 2009, Proceedings, pp. 883-892, 2009, Springer, 978-3-642-04145-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Tae Hwan Kim, Dong Seong Kim 0001, Sang Min Lee 0012, Jong Sou Park |
Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 290-300, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Traffic visualization, Weighted moving average, Intrusion detection, Distributed Denial of Service attacks, Traffic matrix, IP spoofing |
15 | Jan Göbel, Thorsten Holz, Philipp Trinius |
Towards Proactive Spam Filtering (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings, pp. 38-47, 2009, Springer, 978-3-642-02917-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Paolo Milani Comparetti, Gilbert Wondracek, Christopher Krügel, Engin Kirda |
Prospex: Protocol Specification Extraction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 30th IEEE Symposium on Security and Privacy (SP 2009), 17-20 May 2009, Oakland, California, USA, pp. 110-125, 2009, IEEE Computer Society, 978-0-7695-3633-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Mohammad M. Masud 0001, Jing Gao 0004, Latifur Khan, Jiawei Han 0001, Bhavani Thuraisingham |
A Multi-partition Multi-chunk Ensemble Technique to Classify Concept-Drifting Data Streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAKDD ![In: Advances in Knowledge Discovery and Data Mining, 13th Pacific-Asia Conference, PAKDD 2009, Bangkok, Thailand, April 27-30, 2009, Proceedings, pp. 363-375, 2009, Springer, 978-3-642-01306-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Lance Stout, Michael A. Murphy, Sebastien Goasguen |
Kestrel: an XMPP-based framework for many task computing applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SC-MTAGS ![In: Proceedings of the 2nd Workshop on Many-Task Computing on Grids and Supercomputers, MTAGS 2009, November 16, 2009, Portland, Oregon, USA, 2009, ACM, 978-1-60558-714-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cluster, scheduling, grid, distributed, XMPP, MTC |
15 | Spyros Antonatos, Periklis Akritidis, Vinh The Lam, Kostas G. Anagnostakis |
Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 12(2), pp. 12:1-12:38, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Web security, malicious software, distributed attacks |
15 | Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage |
Spamalytics: an empirical analysis of spam marketing conversion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 3-14, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
unsolicited email, spam, conversion |
15 | Aurélien Francillon, Claude Castelluccia |
Code injection attacks on harvard-architecture devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 15-26, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
harvard architecture, return oriented programming, wireless sensor networks, buffer overflow, embedded devices, computer worms, code injection attacks, gadgets |
Displaying result #1 - #100 of 1175 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|