Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
18 | Jinxue Zhang, Rui Zhang 0007, Yanchao Zhang, Guanhua Yan |
On the impact of social botnets for spam distribution and digital-influence manipulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNS ![In: IEEE Conference on Communications and Network Security, CNS 2013, National Harbor, MD, USA, October 14-16, 2013, pp. 46-54, 2013, IEEE. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Adeeb M. Alhomoud, Irfan-Ullah Awan, Jules Pagna Disso |
Towards an enterprise self-healing system against botnets attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNC ![In: International Conference on Computing, Networking and Communications, ICNC 2013, San Diego, CA, USA, January 28-31, 2013, pp. 1112-1117, 2013, IEEE Computer Society, 978-1-4673-5287-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Huy Hang, Xuetao Wei, Michalis Faloutsos, Tina Eliassi-Rad |
Entelecheia: Detecting P2P botnets in their waiting stage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networking ![In: IFIP Networking Conference, 2013, Brooklyn, New York, USA, 22-24 May, 2013, pp. 1-9, 2013, IEEE Computer Society, 978-3-901882-55-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
18 | Michalis Faloutsos |
Detecting malware with graph-based methods: traffic classification, botnets, and facebook scams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW (Companion Volume) ![In: 22nd International World Wide Web Conference, WWW '13, Rio de Janeiro, Brazil, May 13-17, 2013, Companion Volume, pp. 495-496, 2013, International World Wide Web Conferences Steering Committee / ACM, 978-1-4503-2038-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Daniel Andrew, Hongmei Chi |
An empirical study of botnets on university networks using low-interaction honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: ACM Southeast Regional Conference 2013, ACM SE'13, Savannah, GA, USA, April 4-6, 2013, pp. 44:1-44:2, 2013, ACM, 978-1-4503-1901-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Diogo Mónica, Carlos Ribeiro |
Leveraging Honest Users: Stealth Command-and-Control of Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOOT ![In: 7th USENIX Workshop on Offensive Technologies, WOOT '13, Washington, D.C., USA, August 13, 2013, 2013, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
18 | Lei Cao, Xiaofeng Qiu |
Defence against Botnets: A Formal Definition and a General Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NAS ![In: IEEE Eighth International Conference on Networking, Architecture and Storage, NAS 2013, Xi'an, Shaanxi, China, July 17-19, 2013, pp. 237-241, 2013, IEEE Computer Society, 978-0-7695-5034-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Xiang Cui, Binxing Fang, Jinqiao Shi, Chaoge Liu |
Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers, pp. 53-68, 2013, Springer, 978-3-319-04282-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Deepali Arora, Teghan Godkin, Adam Verigin, Stephen W. Neville |
Empirical Evidence for Non-equilibrium Behaviors within Peer-to-Peer Structured Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BWCCA ![In: 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications, Compiegne, France, October 28-30, 2013, pp. 273-281, 2013, IEEE, 978-0-7695-5093-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Tianzuo Wang, Huaimin Wang, Bo Liu, Peichang Shi |
Model the Influence of Sybil Nodes in P2P Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Network and System Security - 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings, pp. 54-67, 2013, Springer, 978-3-642-38630-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Arian Bär, Antonio Paciello, Peter Romirer-Maierhofer |
Trapping botnets by DNS failure graphs: Validation, extension and application to a 3G network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM Workshops ![In: 2013 Proceedings IEEE INFOCOM Workshops, Turin, Italy, April 14-19, 2013, pp. 393-398, 2013, IEEE, 978-1-4799-0056-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Arian Bär, Antonio Paciello, Peter Romirer-Maierhofer |
Trapping botnets by DNS failure graphs: Validation, extension and application to a 3G network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, pp. 3159-3164, 2013, IEEE, 978-1-4673-5944-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Christian Rossow, Christian J. Dietrich |
ProVeX: Detecting Botnets with Encrypted Command and Control Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings, pp. 21-40, 2013, Springer, 978-3-642-39234-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Christian Rossow, Dennis Andriesse, Tillmann Werner, Brett Stone-Gross, Daniel Plohmann, Christian J. Dietrich, Herbert Bos |
SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, USA, May 19-22, 2013, pp. 97-111, 2013, IEEE Computer Society, 978-1-4673-6166-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Igor V. Kotenko |
Experiments With Simulation Of Botnets And Defense Agent Teams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECMS ![In: Proceedings of the 27th European Conference on Modelling and Simulation, ECMS 2013, Ålesund, Norway, May 27-30, 2013, pp. 61-67, 2013, European Council for Modeling and Simulation, 978-0-9564944-6-7. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Dennis Andriesse, Christian Rossow, Brett Stone-Gross, Daniel Plohmann, Herbert Bos |
Highly resilient peer-to-peer botnets are here: An analysis of Gameover Zeus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 8th International Conference on Malicious and Unwanted Software: `The Americas`, MALWARE 2013, Fajardo, PR, USA, October 22-24, 2013, pp. 116-123, 2013, IEEE Computer Society, 978-1-4799-2534-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Danny Bradbury |
Fighting botnets with sinkholes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Netw. Secur. ![In: Netw. Secur. 2012(8), pp. 12-15, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Igor V. Kotenko, Alexey Konovalov, Andrey Shorov |
Agent-based simulation of cooperative defence against botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 24(6), pp. 573-588, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Hyunsang Choi, Heejo Lee |
Identifying botnets by capturing group activities in DNS traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 56(1), pp. 20-33, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Manoj Rameshchandra Thakur, Divye Raj Khilnani, Kushagra Gupta, Sandeep Jain, Vineet Agarwal, Suneeta Sane, Sugata Sanyal, Prabhakar S. Dhekne |
Detection and prevention of botnets and malware in an enterprise network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Wirel. Mob. Comput. ![In: Int. J. Wirel. Mob. Comput. 5(2), pp. 144-153, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Alper K. Caglayan, Mike Toothaker, Dan Drapeau, Dustin Burke, Gerry Eaton |
Behavioral analysis of botnets for threat intelligence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. E Bus. Manag. ![In: Inf. Syst. E Bus. Manag. 10(4), pp. 491-519, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Tianzuo Wang, Huaimin Wang, Bo Liu 0014, Bo Ding, Jing Zhang, Peichang Shi |
Further Analyzing the Sybil Attack in Mitigating Peer-to-Peer Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSII Trans. Internet Inf. Syst. ![In: KSII Trans. Internet Inf. Syst. 6(10), pp. 2731-2749, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Nuno Rodrigues, Rui Sousa, Paulo Salvador Ferreira, António Manuel Duarte Nogueira |
Characterization and Modeling of Top Spam Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Netw. Protoc. Algorithms ![In: Netw. Protoc. Algorithms 4(4), pp. 1-26, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Michael Brian Pope, Merrill Warkentin, Xin (Robert) Luo |
Evolutionary Malware: Mobile Malware, Botnets, and Malware Toolkits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Wirel. Networks Broadband Technol. ![In: Int. J. Wirel. Networks Broadband Technol. 2(3), pp. 52-60, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Peter Haider, Tobias Scheffer |
Finding Botnets Using Minimal Graph Clusterings ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1206.4675, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
18 | Fuye Han, Zhen Chen, HongFeng Xu, Haopei Wang, Yong Liang |
A collaborative botnets suppression system based on overlay network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Secur. Networks ![In: Int. J. Secur. Networks 7(4), pp. 211-219, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Samuel Greengard |
The war against botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 55(2), pp. 16-18, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Axelle Apvrille |
Symbian worm Yxes: towards mobile botnets? ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 8(4), pp. 117-131, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Young-Hoon Moon, Eunjin Kim, Suh Mahn Hur, Huy Kang Kim |
Detection of botnets before activation: an enhanced honeypot system for intentional infection and behavioral observation of malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 5(10), pp. 1094-1101, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Aaron Martin, Norberto Nuno Gomes de Andrade |
Battling Botnets with Digital Rights in Mind. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Eur. J. Law Technol. ![In: Eur. J. Law Technol. 3(2), 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
18 | Deepali Arora, Teghan Godkin, Adam Verigin, Stephen W. Neville |
Assessing Trade-Offs between Stealthiness and Node Recruitment Rates in Peer-to-Peer Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
3PGCIC ![In: 2012 Seventh International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2012, Victoria, BC, Canada, November 12-14, 2012, pp. 148-155, 2012, IEEE, 978-1-4673-2991-0. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Xiang Cui, Binxing Fang, Peng Liao, Chaoge Liu |
Advanced triple-channel botnets: model and implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012, pp. 1019-1021, 2012, ACM, 978-1-4503-1651-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Luís Mendonça, Henrique Santos 0001 |
Botnets: a heuristic-based detection framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012, pp. 33-40, 2012, ACM, 978-1-4503-1668-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Igor V. Kotenko, Andrey Shorov |
Simulation of Protection Mechanisms against Botnets on the Basis of "Nervous Network" Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIMULTECH ![In: SIMULTECH 2012 - Proceedings of the 2nd International Conference on Simulation and Modeling Methodologies, Technologies and Applications, Rome, Italy, 28 - 31 July, 2012., pp. 164-169, 2012, SciTePress, 978-989-8565-20-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
18 | Rui Sousa, Nuno Rodrigues, Paulo Salvador 0001, António Nogueira |
Analyzing the behavior of top spam botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2012, Ottawa, ON, Canada, June 10-15, 2012, pp. 6540-6544, 2012, IEEE, 978-1-4577-2052-9. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Shuai Wang, Xiang Cui, Peng Liao, Dan Li |
S-URL Flux: A Novel C&C Protocol for Mobile Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers, pp. 412-419, 2012, Springer, 978-3-642-35794-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Xiaobo Ma, Jianfeng Li, Jing Tao, Xiaohong Guan |
Towards active measurement for DNS query behavior of botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: 2012 IEEE Global Communications Conference, GLOBECOM 2012, Anaheim, CA, USA, December 3-7, 2012, pp. 845-849, 2012, IEEE, 978-1-4673-0920-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Heloise Pieterse, Martin S. Olivier |
Android botnets on the rise: Trends and characteristics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSA ![In: 2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012, pp. 1-5, 2012, IEEE, 978-1-4673-2160-0. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Xiang Cui, Jinqiao Shi, Peng Liao, Chaoge Liu |
The Triple-Channel Model: Toward Robust and Efficient Advanced Botnets (Poster Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Research in Attacks, Intrusions, and Defenses - 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings, pp. 376-377, 2012, Springer, 978-3-642-33337-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Matthew Knysz, Xin Hu 0001, Yuanyuan Zeng, Kang G. Shin |
Open WiFi networks: Lethal weapons for botnets? ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, pp. 2631-2635, 2012, IEEE, 978-1-4673-0773-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Shui Yu 0001, Song Guo 0001, Ivan Stojmenovic |
Can we beat legitimate cyber behavior mimicking attacks from botnets? ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, pp. 2851-2855, 2012, IEEE, 978-1-4673-0773-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Fuye Han, Zhen Chen, HongFeng Xu, Yong Liang |
Garlic: A Distributed Botnets Suppression System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), Macau, China, June 18-21, 2012, pp. 634-639, 2012, IEEE Computer Society, 978-1-4673-1423-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Biao Jiang, Eul Gyu Im, Yunmo Koo |
SaaS-Driven Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2012, Kuala Lumpur, Malaysia, May 29, 2012. Proceedings, pp. 198-206, 2012, Springer, 978-3-642-30427-9. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Peter Haider, Tobias Scheffer |
Finding Botnets Using Minimal Graph Clusterings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICML ![In: Proceedings of the 29th International Conference on Machine Learning, ICML 2012, Edinburgh, Scotland, UK, June 26 - July 1, 2012, 2012, icml.cc / Omnipress. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
18 | Shuang Zhao, Patrick P. C. Lee, John C. S. Lui, Xiaohong Guan, Xiaobo Ma, Jing Tao |
Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 28th Annual Computer Security Applications Conference, ACSAC 2012, Orlando, FL, USA, 3-7 December 2012, pp. 119-128, 2012, ACM, 978-1-4503-1312-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Dmitry P. Zegzhda, Tatiana V. Stepanova |
Stochastic Model of Interaction between Botnets and Distributed Computer Defense Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings, pp. 218-225, 2012, Springer, 978-3-642-33703-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Yuanyuan Zeng, Kang G. Shin, Xin Hu 0001 |
Design of SMS commanded-and-controlled and P2P-structured mobile botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC 2012, Tucson, AZ, USA, April 16-18, 2012, pp. 137-148, 2012, ACM, 978-1-4503-1265-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Yuanyuan Zeng |
On Detection of Current and Next-Generation Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2012 |
RDF |
|
18 | Ok-Ran Jeong, Chulyun Kim, Won Kim 0001, Jungmin So |
Botnets: threats and responses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Web Inf. Syst. ![In: Int. J. Web Inf. Syst. 7(1), pp. 6-17, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Steve Gold |
Taking down botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Netw. Secur. ![In: Netw. Secur. 2011(5), pp. 13-15, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Guanhua Yan, Duc T. Ha, Stephan J. Eidenbenz |
AntBot: Anti-pollution peer-to-peer botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 55(8), pp. 1941-1956, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Wajeb Gharibi, Abdulrahman Mirza |
Software Vulnerabilities, Banking Threats, Botnets and Malware Self-Protection Technologies ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1105.1720, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
18 | Zhen Li 0025, Qi Liao 0002, Andrew Blaich, Aaron Striegel |
Fighting botnets with economic uncertainty. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 4(10), pp. 1104-1113, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Junjie Zhang 0004, Roberto Perdisci, Wenke Lee, Unum Sarfraz, Xiapu Luo |
Detecting stealthy P2P botnets using statistical traffic fingerprints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2011, Hong Kong, China, June 27-30 2011, pp. 121-132, 2011, IEEE Compute Society, 978-1-4244-9233-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Peng Liao, Xiang Cui, Shuhao Li, Chaoge Liu |
Poster: recoverable botnets: a hybrid C&C approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011, pp. 833-836, 2011, ACM, 978-1-4503-0948-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
18 | Eric Koziel, David Robinson |
Botnets as an Instrument of Warfare. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection V - 5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011, Hanover, NH, USA, March 23-25, 2011, Revised Selected Papers, pp. 19-28, 2011, Springer, 978-3-642-24863-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Jérôme François, Shaonan Wang, Walter Bronzi, Radu State, Thomas Engel 0001 |
BotCloud: Detecting botnets using MapReduce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WIFS ![In: 2011 IEEE International Workshop on Information Forensics and Security, WIFS 2011, Iguacu Falls, Brazil, November 29 - December 2, 2011, pp. 1-6, 2011, IEEE Computer Society, 978-1-4577-1017-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Jérôme François, Shaonan Wang, Radu State, Thomas Engel 0001 |
BotTrack: Tracking Botnets Using NetFlow and PageRank. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networking (1) ![In: NETWORKING 2011 - 10th International IFIP TC 6 Networking Conference, Valencia, Spain, May 9-13, 2011, Proceedings, Part I, pp. 1-14, 2011, Springer, 978-3-642-20756-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Rafael Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro Garcia-Teodoro |
Analysis of Botnets through Life-cycle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications, pp. 257-262, 2011, SciTePress, 978-989-8425-71-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
18 | Kassidy P. Clark, Martijn Warnier, Frances M. T. Brazier |
Botclouds - The Future of Cloud-based Botnets? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CLOSER ![In: CLOSER 2011 - Proceedings of the 1st International Conference on Cloud Computing and Services Science, Noordwijkerhout, Netherlands, 7-9 May, 2011, pp. 597-603, 2011, SciTePress, 978-989-8425-52-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
18 | Christian J. Dietrich, Christian Rossow, Felix C. Freiling, Herbert Bos, Maarten van Steen, Norbert Pohlmann |
On Botnets That Use DNS for Command and Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC2ND ![In: Seventh European Conference on Computer Network Defense, EC2ND 2011, Gothenburg, Sweden, September 6-7, 2011, pp. 9-16, 2011, IEEE Computer Society, 978-1-4673-2116-7. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Ickin Vural, Hein S. Venter |
Detecting Mobile Spam Botnets Using Artificial immune Systems. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP Int. Conf. Digital Forensics ![In: Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31 - February 2, 2011, Revised Selected Papers, pp. 183-192, 2011, Springer, 978-3-642-24211-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Yuanyuan Zeng, Guanhua Yan, Stephan J. Eidenbenz, Kang G. Shin |
Measuring the effectiveness of infrastructure-level detection of large-scale botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWQoS ![In: 19th International Workshop on Quality of Service, IWQoS 2011, San Jose, California, USA, 6-7 June 2011., pp. 1-9, 2011, IEEE, 978-1-4577-0103-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Jungsuk Song, Jumpei Shimamura, Masashi Eto, Daisuke Inoue, Koji Nakao |
Correlation Analysis between Spamming Botnets and Malware Infected Hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: 11th Annual International Symposium on Applications and the Internet, SAINT 2011, Munich, Germany, 18-21 July, 2011, Proceedings, pp. 372-375, 2011, IEEE Computer Society, 978-1-4577-0531-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
darknet, spam, malware, honeypot, botnet, correlation analysis |
18 | Guanhua Yan, Songqing Chen, Stephan J. Eidenbenz |
RatBot: Anti-enumeration Peer-to-Peer Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings, pp. 135-151, 2011, Springer, 978-3-642-24860-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Xin Hu 0001, Matthew Knysz, Kang G. Shin |
Measurement and analysis of global IP-usage patterns of fast-flux botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2011. 30th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 10-15 April 2011, Shanghai, China, pp. 2633-2641, 2011, IEEE, 978-1-4244-9921-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Olivier Thonnard, Marc Dacier |
A strategic analysis of spam botnets operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEAS ![In: The 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, CEAS 2011, Perth, Australia, September 1-2, 2011, Proceedings, pp. 162-171, 2011, ACM, 978-1-4503-0788-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Xiang Cui, Binxing Fang, Lihua Yin, Xiaoyi Liu, Tianning Zang |
Andbot: Towards Advanced Mobile Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LEET ![In: 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '11, Boston, MA, USA, March 29, 2011, 2011, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
18 | Sherif Saad, Issa Traoré, Ali A. Ghorbani 0001, Bassam Sayed, David Zhao, Wei Lu 0018, John Felix, Payman Hakimian |
Detecting P2P botnets through network behavior analysis and machine learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada, pp. 174-180, 2011, IEEE, 978-1-4577-0582-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Peter Martini |
Botnets - Detection, classification and countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: IEEE 36th Conference on Local Computer Networks, LCN 2011, Bonn, Germany, October 4-7, 2011, 2011, IEEE Computer Society, 978-1-61284-926-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Shuhao Li, Xiao-chun Yun, Zhiyu Hao, Xiang Cui, Yipeng Wang 0001 |
A Propagation Model for Social Engineering Botnets in Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: 12th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2011, Gwangju, Korea, October 20-22, 2011, pp. 423-426, 2011, IEEE Computer Society, 978-0-7695-4564-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Ping Wang, Baber Aslam, Cliff Changchun Zou |
Peer-to-Peer Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Information and Communication Security ![In: Handbook of Information and Communication Security, pp. 335-350, 2010, Springer, 978-3-642-04116-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Claire Elliott |
Botnets: To what extent are they a threat to information security? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. Tech. Rep. ![In: Inf. Secur. Tech. Rep. 15(3), pp. 79-103, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Zhiyong Huang, Xiaoping Zeng, Yong Liu 0013 |
Detecting and blocking P2P botnets through contact tracing chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Internet Protoc. Technol. ![In: Int. J. Internet Protoc. Technol. 5(1/2), pp. 44-54, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Steve Mansfield-Devine |
Battle of the botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Netw. Secur. ![In: Netw. Secur. 2010(5), pp. 4-6, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Yoon-Ho Choi, Peng Liu 0005, Seung-Woo Seo |
Creation of the importance scanning worm using information collected by Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. ![In: Comput. Commun. 33(6), pp. 676-688, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Yousof Al-Hammadi, Uwe Aickelin |
Detecting Botnets Through Log Correlation ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1001.2665, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
18 | Zesheng Chen, Chao Chen 0001, Qian Wang |
On the scalability of Delay-Tolerant Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Secur. Networks ![In: Int. J. Secur. Networks 5(4), pp. 248-258, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Alexander K. Seewald, Wilfried N. Gansterer |
On the detection and identification of botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 29(1), pp. 45-58, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Yuanyuan Zeng, Xin Hu 0001, Kang G. Shin |
Detection of botnets using combined host- and network-level information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2010, Chicago, IL, USA, June 28 - July 1 2010, pp. 291-300, 2010, IEEE Computer Society, 978-1-4244-7501-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | David Dittrich, Felix Leder, Tillmann Werner |
A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography Workshops ![In: Financial Cryptography and Data Security, FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers, pp. 216-230, 2010, Springer, 978-3-642-14991-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Yan Jia 0001, Runheng Li, Liang Gan, Guangqiang Chen |
IRC Botnets' Homology Identifying Method Based on Improved LB_PAA Distance of Communication Characteristic Curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IITSI ![In: Third International Symposium on Intelligent Information Technology and Security Informatics, IITSI 2010, Jinggangshan, China, April 2-4, 2010, pp. 360-365, 2010, IEEE Computer Society, 978-0-7695-4020-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
dynamic time warping distance, LB_PAA, communication, botnet, homologous |
18 | Marco Ajelli, Renato Lo Cigno, Alberto Montresor |
Modeling Botnets and Epidemic Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2010, Cape Town, South Africa, 23-27 May 2010, pp. 1-5, 2010, IEEE, 978-1-4244-6402-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Andrew White, Alan Tickle, Andrew J. Clark |
Overcoming Reputation and Proof-of-Work Systems in Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 120-127, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Nur Rohman Rosyid, Masayuki Ohrui, Hiroaki Kikuchi, Pitikhate Sooraksa, Masato Terada |
A discovery of sequential attack patterns of malware in botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC ![In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Istanbul, Turkey, 10-13 October 2010, pp. 2564-2570, 2010, IEEE, 978-1-4244-6588-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Brent Rowe, Dallas Wood, Douglas S. Reeves |
How the Public Views Strategies Designed to Reduce the Threat of Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trust and Trustworthy Computing, Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010. Proceedings, pp. 337-351, 2010, Springer, 978-3-642-13868-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Igor V. Kotenko, Alexey Konovalov, Andrey Shorov |
Simulation of Botnets: Agent-Based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDC ![In: Intelligent Distributed Computing IV - Proceedings of the 4th International Symposium on Intelligent Distributed Computing - IDC 2010, Tangier, Morocco, September 2010, pp. 247-252, 2010, 978-3-642-15210-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Won Kim 0001, Ok-Ran Jeong, Chulyun Kim, Jungmin So |
On botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iiWAS ![In: iiWAS'2010 - The 12th International Conference on Information Integration and Web-based Applications and Services, 8-10 November 2010, Paris, France, pp. 5-10, 2010, ACM, 978-1-4503-0421-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Baris Coskun, Sven Dietrich, Nasir D. Memon |
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010, pp. 131-140, 2010, ACM, 978-1-4503-0133-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Jérôme François, Radu State, Olivier Festor |
Botnets IRC et P2P pour une supervision à large échelle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Tech. Sci. Informatiques ![In: Tech. Sci. Informatiques 28(4), pp. 433-458, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Srdjan Stankovic, Dejan Simic |
Defense Strategies Against Modern Botnets ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/0906.3768, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
18 | Basil AsSadhan, José M. F. Moura, David E. Lapsley, Christine E. Jones, W. Timothy Strayer |
Detecting Botnets Using Command and Control Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, NCA 2009, July 9-11, 2009, Cambridge, Massachusetts, USA, pp. 156-162, 2009, IEEE Computer Society, 978-0-7695-3698-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Botnet detection, discrete time series analysis, periodogram, Walker large sample test, SLINGbot |
18 | Duc T. Ha, Guanhua Yan, Stephan J. Eidenbenz, Hung Q. Ngo 0001 |
On the effectiveness of structural detection and defense against P2P-based botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2009, Estoril, Lisbon, Portugal, June 29 - July 2, 2009, pp. 297-306, 2009, IEEE Computer Society, 978-1-4244-4422-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent Jaeger, Patrick D. McDaniel, Thomas La Porta |
On cellular botnets: measuring the impact of malicious devices on a cellular network core. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 223-234, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
mobile phones, denial-of-service, telecommunications |
18 | Sang-Kyun Noh, Joo-Hyung Oh, Jae-Seo Lee, Bong-Nam Noh, Hyun-Cheol Jeong |
Detecting P2P Botnets Using a Multi-phased Flow Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDS ![In: Third International Conference on the Digital Society (ICDS 2009), February 1-7, 2009, Cancun, Mexico, pp. 247-253, 2009, IEEE Computer Society, 978-0-7695-3526-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Miroslaw Szymczyk |
Detecting Botnets in Computer Networks Using Multi-agent Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DepCoS-RELCOMEX ![In: Fourth International Conference on Dependability of Computer Systems, DepCos-RELCOMEX '09, Brunow, Poland, June 30 - July 2, 2009, pp. 192-201, 2009, IEEE Computer Society, 978-0-7695-3674-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Kyle Smith, Ehab Al-Shaer, Khalid Elbadawi |
Information Theoretic Approach for Characterizing Spam Botnets Based on Traffic Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2009, Dresden, Germany, 14-18 June 2009, pp. 1-5, 2009, IEEE. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Xin Hu 0001, Matthew Knysz, Kang G. Shin |
RB-Seeker: Auto-detection of Redirection Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: Proceedings of the Network and Distributed System Security Symposium, NDSS 2009, San Diego, California, USA, 8th February - 11th February 2009, 2009, The Internet Society. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
18 | Byungseung Kim, Hyogon Kim, Saewoong Bahk |
NSF: Network-Based Spam Filtering Based on On-Line Blacklisting against Spamming Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009, pp. 1-6, 2009, IEEE. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
18 | John P. John, Alexander Moshchuk, Steven D. Gribble, Arvind Krishnamurthy |
Studying Spamming Botnets Using Botlab. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSDI ![In: Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2009, April 22-24, 2009, Boston, MA, USA, pp. 291-306, 2009, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|