|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 128 occurrences of 71 keywords
|
|
|
Results
Found 463 publication records. Showing 463 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
102 | Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis |
A multifaceted approach to understanding the botnet phenomenon. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, IMC 2006, Rio de Janeriro, Brazil, October 25-27, 2006, pp. 41-52, 2006, ACM, 1-59593-561-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
network security, computer security, malware, botnets |
96 | Justin Leonard, Shouhuai Xu, Ravi S. Sandhu |
A Framework for Understanding Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 917-922, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
96 | Justin Leonard, Shouhuai Xu, Ravi S. Sandhu |
A First Step towards Characterizing Stealthy Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 106-113, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
94 | Zhaosheng Zhu, Guohan Lu, Yan Chen 0004, Zhi (Judy) Fu, Phil Roberts, Keesook Han |
Botnet Research Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2008, 28 July - 1 August 2008, Turku, Finland, pp. 967-972, 2008, IEEE Computer Society, 978-0-7695-3262-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Survey, Botnet |
81 | Binbin Wang, Zhitang Li, Hao Tu, Jie Ma |
Measuring Peer-to-Peer Botnets Using Control Flow Stability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 663-669, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
81 | Hao Tu, Zhitang Li, Bin Liu 0013 |
Detecting Botnets by Analyzing DNS Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings, pp. 323-324, 2007, Springer, 978-3-540-71548-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
79 | Su Chang, Thomas E. Daniels |
P2P botnet detection using behavior clustering & statistical tests. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009, pp. 23-30, 2009, ACM, 978-1-60558-781-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
machine learning, network security, anomaly detection |
71 | Iván Sánchez Milara, Erno Kuusela, Sebastian Turpeinen, Juha Röning, Jukka Riekki |
Botnet-inspired architecture for interactive spaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MUM ![In: Proceedings of the 8th International Conference on Mobile and Ubiquitous Multimedia, MUM 2009, Cambridge, United Kingdom, November 22-25, 2009, 2009, ACM, 978-1-60558-846-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
architecture comparison, HCI, remote control, botnets, multimedia services, interactive spaces, IRC |
65 | Elizabeth Van Ruitenbeek, William H. Sanders |
Modeling Peer-to-Peer Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QEST ![In: Fifth International Conference on the Quantitative Evaluaiton of Systems (QEST 2008), 14-17 September 2008, Saint-Malo, France, pp. 307-316, 2008, IEEE Computer Society, 978-0-7695-3360-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
63 | Wei Lu 0018, Mahbod Tavallaee, Ali A. Ghorbani 0001 |
Automatic discovery of botnet communities on large-scale communication networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 1-10, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
botnet detection, machine learning, traffic classification |
63 | Zonghua Zhang, Ruo Ando, Youki Kadobayashi |
Hardening Botnet by a Rational Botmaster. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 348-369, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
intrusion detection, Network security, malware, botnet |
63 | Emanuele Passerini, Roberto Paleari, Lorenzo Martignoni, Danilo Bruschi |
FluXOR: Detecting and Monitoring Fast-Flux Service Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings, pp. 186-206, 2008, Springer, 978-3-540-70541-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
49 | Jérôme François, Radu State, Olivier Festor |
Botnets for Scalable Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSOM ![In: Managing Virtualization of Networks and Services, 18th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2007, San José, CA, USA, October 29-31, 2007, Proceedings, pp. 1-12, 2007, Springer, 978-3-540-75693-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
49 | W. Timothy Strayer, Robert Walsh, Carl Livadas, David E. Lapsley |
Detecting Botnets with Tight Command and Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: LCN 2006, The 31st Annual IEEE Conference on Local Computer Networks, Tampa, Florida, USA, 14-16 November 2006, pp. 195-202, 2006, IEEE Computer Society, 1-4244-0418-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna |
Your botnet is my botnet: analysis of a botnet takeover. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 635-647, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
torpig, security, measurement, malware, botnet |
47 | Kapil Singh, Abhinav Srivastava, Jonathon T. Giffin, Wenke Lee |
Evaluating email's feasibility for botnet command and control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: The 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2008, June 24-27, 2008, Anchorage, Alaska, USA, Proceedings, pp. 376-385, 2008, IEEE Computer Society, 978-1-4244-2397-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Huidong Jin 0001, Olivier Y. de Vel, Ke Zhang, Nianjun Liu |
Knowledge Discovery from Honeypot Data for Monitoring Malicious Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australasian Conference on Artificial Intelligence ![In: AI 2008: Advances in Artificial Intelligence, 21st Australasian Joint Conference on Artificial Intelligence, Auckland, New Zealand, December 1-5, 2008. Proceedings, pp. 470-481, 2008, Springer, 978-3-540-89377-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
density-based cluster visualisation, honeypot data, Knowledge discovery, outlier detection, botnet, Internet security |
47 | Hyunsang Choi, Hanwoo Lee, Heejo Lee, Hyogon Kim |
Botnet Detection by Monitoring Group Activities in DNS Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: Seventh International Conference on Computer and Information Technology (CIT 2007), October 16-19, 2007, University of Aizu, Fukushima, Japan, pp. 715-720, 2007, IEEE Computer Society, 978-0-7695-2983-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Mitsuaki Akiyama, Takanori Kawamoto, Masayoshi Shimamura, Teruaki Yokoyama, Youki Kadobayashi, Suguru Yamaguchi |
A Proposal of Metrics for Botnet Detection Based on Its Cooperative Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT Workshops ![In: 2007 International Symposium on Applications and the Internet - Workshops (SAINT 2007 Workshops), 15-19 January 2007, Hiroshima, Japan, pp. 82, 2007, IEEE Computer Society, 0-7695-2757-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Amey Shevtekar, Nirwan Ansari |
A Proactive Test Based Differentiation Technique to Mitigate Low Rate DoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the 16th International Conference on Computer Communications and Networks, IEEE ICCCN 2007, Turtle Bay Resort, Honolulu, Hawaii, USA, August 13-16, 2007, pp. 639-644, 2007, IEEE, 978-1-4244-1251-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
41 | Greg Goth |
Fast-Moving Zombies: Botnets Stay a Step Ahead of the Fixes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 11(2), pp. 7-9, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
zombies, malware, botnets |
39 | Jason Reed 0001, Adam J. Aviv, Daniel Wagner 0001, Andreas Haeberlen, Benjamin C. Pierce, Jonathan M. Smith |
Differential privacy for collaborative security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROSEC ![In: Proceedings of the Third European Workshop on System Security, EUROSEC 2010, Paris, France, April 13, 2010, pp. 1-7, 2010, ACM, 978-1-4503-0059-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
collaborative security, botnets, differential privacy |
39 | Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis, Niels Provos |
Peeking Through the Cloud: DNS-Based Estimation and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings, pp. 21-38, 2008, 978-3-540-68913-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Client Density Estimation, Web-metering, Network Security, Botnets |
39 | Rick Wash |
Incentive design for home computer security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended Abstracts Proceedings of the 2007 Conference on Human Factors in Computing Systems, CHI 2007, San Jose, California, USA, April 28 - May 3, 2007, pp. 1681-1684, 2007, ACM, 978-1-59593-642-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
botnets |
39 | M. Patrick Collins, Timothy J. Shimeall, Sidney Faber, Jeff Janies, Rhiannon Weaver, Markus De Shon, Joseph B. Kadane |
Using uncleanliness to predict future botnet addresses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, IMC 2007, San Diego, California, USA, October 24-26, 2007, pp. 93-104, 2007, ACM, 978-1-59593-908-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
botnets, reputation management, blacklists |
39 | Linda Dailey Paulson |
News Briefs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 39(4), pp. 17-19, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Immersion lithography, Spam, Malware, E-mail, Botnets, Hackers, Semiconductors |
36 | Abderrahmen Mtibaa, Khaled A. Harras, Hussein M. Alnuweiri |
From botnets to MobiBots: a novel malicious communication paradigm for mobile botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Commun. Mag. ![In: IEEE Commun. Mag. 53(8), pp. 61-67, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
36 | Éric Freyssinet |
Lutte contre les botnets : analyse et stratégie. (The fight against botnets: from observation to strategy). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2015 |
RDF |
|
36 | Zhuo Lu, Wenye Wang, Cliff Wang |
How can botnets cause storms? Understanding the evolution and impact of mobile botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: 2014 IEEE Conference on Computer Communications, INFOCOM 2014, Toronto, Canada, April 27 - May 2, 2014, pp. 1501-1509, 2014, IEEE, 978-14799-3360-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
36 | Christian Czosseck, Gabriel Klein, Felix Leder |
On the arms race around botnets - Setting up and taking down botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyCon ![In: 3rd International Conference on Cyber Conflict, CyCon 2011, Tallinn, Estonia, June 7-10, 2011, pp. 1-14, 2011, IEEE, 978-1-61284-245-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
36 | Julian B. Grizzard, Vikram Sharma 0002, Chris Nunnery, Brent ByungHoon Kang, David Dagon |
Peer-to-Peer Botnets: Overview and Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HotBots ![In: First Workshop on Hot Topics in Understanding Botnets, HotBots'07, Cambridge, MA, USA, April 10, 2007, 2007, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
33 | Claudio Mazzariello, Carlo Sansone |
Anomaly-Based Detection of IRC Botnets by Means of One-Class Support Vector Classifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIAP ![In: Image Analysis and Processing - ICIAP 2009, 15th International Conference Vietri sul Mare, Italy, September 8-11, 2009, Proceedings, pp. 883-892, 2009, Springer, 978-3-642-04145-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Ian Castle, Eimear Buckley |
The Automatic Discovery, Identification and Measurement of Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008, August 25-31, 2008, Cap Esterel, France, pp. 127-132, 2008, IEEE Computer Society, 978-0-7695-3329-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Husain Husna, Santi Phithakkitnukoon, Srikanth Palla, Ram Dantu |
Behavior analysis of spam botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMSWARE ![In: Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), January 5-10, 2008, Bangalore, India, pp. 246-253, 2008, IEEE, 978-1-4244-1797-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Carlton R. Davis, Stephen Neville, José M. Fernandez 0001, Jean-Marc Robert 0001, John McHugh |
Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings, pp. 461-480, 2008, Springer, 978-3-540-88312-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Clinton J. Mielke, Hsinchun Chen |
Botnets, and the cybercriminal underground. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings, pp. 206-211, 2008, IEEE, 978-1-4244-2414-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Rick Wash |
Folk models of home computer security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS 2010, Redmond, Washington, USA, July 14-16, 2010, 2010, ACM, 978-1-4503-0264-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
folk models, home security, mental models |
31 | Felix Leder, Peter Martini |
NGBPA Next Generation BotNet Protocol Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings, pp. 307-317, 2009, Springer, 978-3-642-01243-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Cliff Changchun Zou, Ryan Cunningham |
Honeypot-Aware Advanced Botnet Construction and Maintenance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2006 International Conference on Dependable Systems and Networks (DSN 2006), 25-28 June 2006, Philadelphia, Pennsylvania, USA, Proceedings, pp. 199-208, 2006, IEEE Computer Society, 0-7695-2607-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Carl Livadas, Robert Walsh, David E. Lapsley, W. Timothy Strayer |
Using Machine Learning Techniques to Identify Botnet Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: LCN 2006, The 31st Annual IEEE Conference on Local Computer Networks, Tampa, Florida, USA, 14-16 November 2006, pp. 967-974, 2006, IEEE Computer Society, 1-4244-0418-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Masayuki Ohrui, Hiroaki Kikuchi, Masato Terada, Nur Rohman Rosyid |
Apriori-PrefixSpan Hybrid Approach for Automated Detection of Botnet Coordinated Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NBiS ![In: The 14th International Conference on Network-Based Information Systems, NBiS 2011, Tirana, Albania, September 7-9, 2011, pp. 92-97, 2011, IEEE Computer Society, 978-1-4577-0789-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
PrefixSpan, Coordinated Attacks, Malware, Botnets, Apriori |
23 | Veronica C. Estrada, Akihiro Nakao |
A Survey on the Use of Traffic Traces to Battle Internet Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Third International Conference on Knowledge Discovery and Data Mining, WKDD 2010, Phuket, Thailand, 9-10 January 2010, pp. 601-604, 2010, IEEE Computer Society, 978-0-7695-3923-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
clustering, Intrusion-detection, traffic-classification, botnets |
23 | Marco Ramilli, Marco Prandini |
A Messaging-Based System for Remote Server Administration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 262-269, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
instant messaging, botnets, system administration |
23 | Jiang Wang 0008, Anup K. Ghosh, Yih Huang |
Web Canary: A Virtualized Web Browser to Support Large-Scale Silent Collaboration in Detecting Malicious Web Sites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CollaborateCom ![In: Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers, pp. 24-33, 2008, Springer / ICST, 978-3-642-03353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Web browser security, honey client, virtualization, botnets, spyware, malicious code |
23 | Anirudh Ramachandran, Nick Feamster, Santosh S. Vempala |
Filtering spam with behavioral blacklisting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 342-351, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, clustering, spam, botnets, blacklists |
23 | Rick Wash, Jeffrey K. MacKie-Mason |
Security when people matter: structuring incentives for user behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 9th International Conference on Electronic Commerce: The Wireless World of Electronic Commerce, 2007, University of Minnesota, Minneapolis, MN, USA, August 19-22, 2007, pp. 7-14, 2007, ACM, 978-1-59593-700-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, design, spam, economics, incentives, botnets, captcha |
23 | Jose Nazario |
Where the worms aren't. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WORM ![In: Proceedings of the 2006 ACM Workshop on Rapid Malcode, WORM 2006, Alexandria, VA, USA, November 3, 2006, pp. 49-50, 2006, ACM Press, 1-59593-551-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
securty, worms, vulnerabilities, botnets, exploits |
18 | Jaime Tamayo, Lorena Isabel Barona López, Ángel Leonardo Valdivieso Caraguay |
Detection of Distributed Denial of Service Attacks Carried Out by Botnets in Software-Defined Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.09358, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Ruidong Chen, Tianci Dai, Yanfeng Zhang, Yukun Zhu, Xin Liu, Erfan Zhao |
GBDT-IL: Incremental Learning of Gradient Boosting Decision Trees to Detect Botnets in Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 24(7), pp. 2083, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Manmeet Singh, Maninder Singh, Sanmeet Kaur |
TI-16 DNS Labeled Dataset for Detecting Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 62616-62629, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Saad Khan 0012, Akalanka B. Mailewa |
Discover botnets in IoT sensor networks: A lightweight deep learning framework with hybrid self-organizing maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Microprocess. Microsystems ![In: Microprocess. Microsystems 97, pp. 104753, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Ahsan Nazir, Jingsha He, Nafei Zhu, Ahsan Wajahat, Xiangjun Ma, Faheem Ullah, Sirajuddin Qureshi, Muhammad Salman Pathan |
Advancing IoT security: A systematic review of machine learning approaches for the detection of IoT botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. King Saud Univ. Comput. Inf. Sci. ![In: J. King Saud Univ. Comput. Inf. Sci. 35(10), pp. 101820, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Nils Weissgerber, Thorsten Jenke, Elmar Padilla, Lilli Bruckschen |
Open SESAME: Fighting Botnets with Seed Reconstructions of Domain Generation Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2301.05048, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Vinayakumar Ravi, Mamoun Alazab, Sriram Srinivasan, Ajay Arunachalam, K. P. Soman |
Adversarial Defense: DGA-Based Botnets and DNS Homographs Detection Through Integrated Deep Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Engineering Management ![In: IEEE Trans. Engineering Management 70(1), pp. 249-266, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Munzir Mohamed, Hesham ElSawy, Wessam Mesbah |
Optimized Degree-Aware Random Patching for Thwarting IoT Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Netw. Lett. ![In: IEEE Netw. Lett. 5(1), pp. 59-63, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Dan Zhao, Hao Li 0011, Xiuwen Sun, Yazhe Tang |
Detecting DGA-based botnets through effective phonics-based features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 143, pp. 105-117, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Lihai Nie, Xiaoyang Shan, Laiping Zhao, Keqiu Li |
PKDGA: A Partial Knowledge-Based Domain Generation Algorithm for Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 18, pp. 4854-4869, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Yeonjung Lee, Mert Ozer, Steven R. Corman, Hasan Davulcu |
Detecting and Measuring the Polarization Effects of Adversarial Botnets on Twitter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, SAC 2023, Tallinn, Estonia, March 27-31, 2023, pp. 1641-1649, 2023, ACM, 978-1-4503-9517-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Eva Papadogiannaki, Sotiris Ioannidis |
Pump Up the JARM: Studying the Evolution of Botnets Using Active TLS Fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: IEEE Symposium on Computers and Communications, ISCC 2023, Gammarth, Tunisia, July 9-12, 2023, pp. 764-770, 2023, IEEE, 979-8-3503-0048-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Dorieh M. Alomari, Fatima M. Anis, Maryam Alabdullatif, Hamoud Aljamaan |
A Survey on Botnets Attack Detection Utilizing Machine and Deep Learning Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EASE ![In: Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering, EASE 2023, Oulu, Finland, June 14-16, 2023, pp. 493-498, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Tolijan Trajanovski, Ning Zhang |
An Automated Behaviour-Based Clustering of IoT Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 14(1), pp. 6, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Xuan Dau Hoang, Xuan-Hanh Vu |
An improved model for detecting DGA botnets using random forest algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. J. A Glob. Perspect. ![In: Inf. Secur. J. A Glob. Perspect. 31(4), pp. 441-450, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Song Wang 0006, Haroon Elahi, Yanzhu Hu 0001, Yixin Zhang, Jiao Wang |
A botnets control strategy based on variable forgetting rate of control commands. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 34(7), 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Abhijeet Shrivastava, Rudraksh Lakra |
Revisiting due diligence in cyberspace: crafting international law's arsenal against transboundary Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Law Inf. Technol. ![In: Int. J. Law Inf. Technol. 30(3), pp. 321-349, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Rui Tanabe, Tsuyufumi Watanabe, Akira Fujita, Ryoichi Isawa, Carlos Gañán, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto |
Disposable Botnets: Long-term Analysis of IoT Botnet Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Process. ![In: J. Inf. Process. 30, pp. 577-590, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Harry Owen, Javad Zarrin, Shahrzad M. Pour |
A Survey on Botnets, Issues, Threats, Methods, Detection and Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cybersecur. Priv. ![In: J. Cybersecur. Priv. 2(1), pp. 74-88, February 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Mehdi Asadi |
Detecting IoT botnets based on the combination of cooperative game theory with deep and machine learning approaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Ambient Intell. Humaniz. Comput. ![In: J. Ambient Intell. Humaniz. Comput. 13(12), pp. 5547-5561, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Abdullah Mohammed Almuhaideb, Dalal Y. Alynanbaawi |
Applications of Artificial Intelligence to Detect Android Botnets: A Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 71737-71748, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Olivier Tsemogne, Yezekael Hayel, Charles A. Kamhoua, Gabriel Deugoue |
Game-Theoretic Modeling of Cyber Deception Against Epidemic Botnets in Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 9(4), pp. 2678-2687, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Ahmed M. Manasrah, Thair Khdour, Raeda Freehat |
DGA-based botnets detection using DNS traffic mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. King Saud Univ. Comput. Inf. Sci. ![In: J. King Saud Univ. Comput. Inf. Sci. 34(5), pp. 2045-2061, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Rabah Rahal, Abdelaziz Amara Korba, Nacira Ghoualmi-Zine, Yacine Challal, Yacine Ghamri-Doudane |
AntibotV: A Multilevel Behaviour-Based Framework for Botnets Detection in Vehicular Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Syst. Manag. ![In: J. Netw. Syst. Manag. 30(1), pp. 15, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Jeremy Kepner, Jonathan Bernays, Stephen Buckley, Kenjiro Cho, Cary Conrad, Leslie Daigle, Keeley Erhardt, Vijay Gadepally, Barry Greene, Michael Jones 0001, Robert Knake, Bruce M. Maggs, Peter Michaleas, Chad R. Meiners, Andrew Morris, Alex Pentland, Sandeep Pisharody, Sarah Powazek, Andrew Prout, Philip Reiner, Koichi Suzuki, Kenji Takahashi, Tony Tauber, Leah Walker, Doug Stetson |
Zero Botnets: An Observe-Pursue-Counter Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2201.06068, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
18 | Shashank Yadav |
Political Propagation of Social Botnets: Policy Consequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2205.04830, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Wong Yan Shen, Selvakumar Manickam, Mahmood A. Al-Shareeda |
Review of Advanced Monitoring Mechanisms in Peer-to-Peer (P2P) Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2207.12936, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Khoh Choon Hwa, Selvakumar Manickam, Mahmood A. Al-Shareeda |
Review of Peer-to-Peer Botnets and Detection Mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2207.12937, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Lihai Nie, Xiaoyang Shan, Laiping Zhao, Keqiu Li |
PKDGA: A Partial Knowledge-based Domain Generation Algorithm for Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2212.04234, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Lynn Pepin, Lizhi Wang, Jiangwei Wang, Songyang Han, Pranav Pishawikar, Amir Herzberg, Peng Zhang, Fei Miao |
Botnets Breaking Transformers: Localization of Power Botnet Attacks Against the Distribution Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2203.10158, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Raihan Ur Rasool, Hafiz Farooq Ahmad, Wajid Rafique, Adnan Qayyum, Junaid Qadir 0001 |
Security and privacy of internet of medical things: A contemporary review in the age of surveillance, botnets, and adversarial ML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Comput. Appl. ![In: J. Netw. Comput. Appl. 201, pp. 103332, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Ayush Kumar 0001, Mrinalini Shridhar, Sahithya Swaminathan, Teng Joon Lim |
Machine learning-based early detection of IoT botnets using network-edge traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 117, pp. 102693, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Tong Anh Tuan, Hoang Viet Long, David Taniar |
On Detecting and Classifying DGA Botnets and their Families. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 113, pp. 102549, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Taha Shojarazavi, Hamid Barati, Ali Barati |
A wrapper method based on a modified two-step league championship algorithm for detecting botnets in IoT environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computing ![In: Computing 104(8), pp. 1753-1774, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Steven E. Arroyo, Shen-Shyang Ho |
Autoencoder Ensemble Method for Botnets Detection on IOT Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMLA ![In: 21st IEEE International Conference on Machine Learning and Applications, ICMLA 2022, Nassau, Bahamas, December 12-14, 2022, pp. 715-720, 2022, IEEE, 978-1-6654-6283-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Leona McNulty, Vassilios G. Vassilakis |
IoT Botnets: Characteristics, Exploits, Attack Capabilities, and Targets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSNDSP ![In: 13th International Symposium on Communication Systems, Networks and Digital Signal Processing, CSNDSP 2022, Porto, Portugal, July 20-22, 2022, pp. 350-355, 2022, IEEE, 978-1-6654-1044-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Meghana Raghavendra, Zesheng Chen |
Detecting IoT Botnets on IoT Edge Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC Workshops ![In: 2022 IEEE International Conference on Communications Workshops, ICC Workshops 2022, Seoul, Korea, May 16-20, 2022, pp. 373-378, 2022, IEEE, 978-1-6654-2671-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Alvi Jawad, Luke Newton, Ashraf Matrawy, Jason Jaskolka |
A Formal Analysis of the Efficacy of Rebooting as a Countermeasure Against IoT Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: IEEE International Conference on Communications, ICC 2022, Seoul, Korea, May 16-20, 2022, pp. 2206-2211, 2022, IEEE, 978-1-5386-8347-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Hatem A. Almazarqi, Mathew Woodyard, Troy Mursch, Dimitrios Pezaros, Angelos K. Marnerides |
Macroscopic Analysis of IoT Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: IEEE Global Communications Conference, GLOBECOM 2022, Rio de Janeiro, Brazil, December 4-8, 2022, pp. 2674-2679, 2022, IEEE, 978-1-6654-3540-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Daniele A. G. Lopes, Marcelo Antonio Marotta, Marcelo Ladeira, João J. C. Gondim |
Detecção de botnets baseada na análise de fluxos de rede utilizando estatística inversa. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SBRC ![In: Proceedings of the 40th Brazilian Symposium on Computer Networks and Distributed Systems, SBRC 2022, Fortaleza, CE, Brazil, May 23-27, 2022, pp. 182-195, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
18 | Frank Antonucci, Md Minhaz Chowdhury |
Botnets as the Modern Attack Vector. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIIoT ![In: 2022 IEEE World AI IoT Congress (AIIoT), Seattle, WA, USA, June 6-9, 2022, pp. 585-590, 2022, IEEE, 978-1-6654-8453-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Thanh Cong Tran, Tran Khanh Dang |
Machine Learning for Multi-Classification of Botnets Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMCOM ![In: 16th International Conference on Ubiquitous Information Management and Communication, IMCOM 2022, Seoul, Korea, Republic of, January 3-5, 2022, pp. 1-8, 2022, IEEE, 978-1-6654-2678-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Xuan-Hanh Vu, Xuan Dau Hoang, Thi Hong Hai Chu |
A Novel Model Based on Ensemble Learning for Detecting DGA Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSE ![In: 14th International Conference on Knowledge and Systems Engineering, KSE 2022, Nha Trang, Vietnam, October 19-21, 2022, pp. 1-6, 2022, IEEE, 978-1-6654-5281-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Kumar Saurabh, Ayush Singh, Uphar Singh, O. P. Vyas 0001, Rahamatullah Khondoker |
GANIBOT: A Network Flow Based Semi Supervised Generative Adversarial Networks Model for IoT Botnets Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COINS ![In: IEEE International Conference on Omni-layer Intelligent Systems, COINS 2022, Barcelona, Spain, August 1-3, 2022, pp. 1-5, 2022, IEEE, 978-1-6654-8356-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Mahboubeh Nazari, Zahra Dahmardeh, Sobhan Aliabady |
A Novel Approach of Botnets Detection Based on Analyzing Dynamical Network Traffic Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 2(4), pp. 247, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
18 | Simon Nam Thanh Vu, Mads Stege, Peter Issam El-Habr, Jesper Bang, Nicola Dragoni |
A Survey on Botnets: Incentives, Evolution, Detection and Current Trends. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 13(8), pp. 198, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
18 | Ali Soleymani, Fatemeh Arabgol |
A Novel Approach for Detecting DGA-Based Botnets in DNS Queries Using Machine Learning Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Networks Commun. ![In: J. Comput. Networks Commun. 2021, pp. 4767388:1-4767388:13, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
18 | Hsiao-Chung Lin, Ping Wang 0007, Wen-Hui Lin, Kuo-Ming Chao, Zong-Yu Yang |
Identifying the Attack Sources of Botnets for a Renewable Energy Management System by Using a Revised Locust Swarm Optimisation Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symmetry ![In: Symmetry 13(7), pp. 1295, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
18 | Omniyah Gul M. Khan, Ehab F. El-Saadany, Amr M. Youssef, Mostafa F. Shaaban |
Impact of Electric Vehicles Botnets on the Power Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2103.09153, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
18 | Yuanyuan Huang, Jiazhong Lu, Haozhe Tang, Xiaolei Liu 0001 |
A Hybrid Association Rule-Based Method to Detect and Classify Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 2021, pp. 1028878:1-1028878:9, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
18 | Benjamin Vignau, Raphaël Khoury, Sylvain Hallé, Abdelwahab Hamou-Lhadj |
The Botnet Simulator: A simulation tool for understanding the interaction between botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Softw. Impacts ![In: Softw. Impacts 10, pp. 100173, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
18 | Justin K. Haner, Robert K. Knake |
Breaking botnets: A quantitative analysis of individual, technical, isolationist, and multilateral approaches to cybersecurity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cybersecur. ![In: J. Cybersecur. 7(1), 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
18 | Tohid Shekari, Celine Irvene, Alvaro A. Cárdenas, Raheem Beyah |
MaMIoT: Manipulation of Energy Market Leveraging High Wattage IoT Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021, pp. 1338-1356, 2021, ACM, 978-1-4503-8454-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 463 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ >>] |
|