The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for botnets with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2003-2006 (16) 2007 (31) 2008 (30) 2009 (36) 2010 (21) 2011 (25) 2012 (32) 2013 (28) 2014 (23) 2015 (24) 2016 (15) 2017 (19) 2018 (39) 2019 (35) 2020 (28) 2021 (17) 2022 (31) 2023-2024 (13)
Publication types (Num. hits)
article(162) book(2) incollection(4) inproceedings(289) phdthesis(5) proceedings(1)
Venues (Conferences, Journals, ...)
CoRR(32) HotBots(12) CCS(9) Comput. Secur.(9) ARES(8) ICC(8) Comput. Networks(7) DSN(7) GLOBECOM(7) Computer(6) IEEE Secur. Priv.(6) INFOCOM(6) DIMVA(5) IEEE Access(5) Netw. Secur.(5) SBRC(5) More (+10 of total 255)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 128 occurrences of 71 keywords

Results
Found 463 publication records. Showing 463 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
18Jinxue Zhang, Rui Zhang 0007, Yanchao Zhang, Guanhua Yan On the impact of social botnets for spam distribution and digital-influence manipulation. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Adeeb M. Alhomoud, Irfan-Ullah Awan, Jules Pagna Disso Towards an enterprise self-healing system against botnets attacks. Search on Bibsonomy ICNC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Huy Hang, Xuetao Wei, Michalis Faloutsos, Tina Eliassi-Rad Entelecheia: Detecting P2P botnets in their waiting stage. Search on Bibsonomy Networking The full citation details ... 2013 DBLP  BibTeX  RDF
18Michalis Faloutsos Detecting malware with graph-based methods: traffic classification, botnets, and facebook scams. Search on Bibsonomy WWW (Companion Volume) The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Daniel Andrew, Hongmei Chi An empirical study of botnets on university networks using low-interaction honeypots. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Diogo Mónica, Carlos Ribeiro Leveraging Honest Users: Stealth Command-and-Control of Botnets. Search on Bibsonomy WOOT The full citation details ... 2013 DBLP  BibTeX  RDF
18Lei Cao, Xiaofeng Qiu Defence against Botnets: A Formal Definition and a General Framework. Search on Bibsonomy NAS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Xiang Cui, Binxing Fang, Jinqiao Shi, Chaoge Liu Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets. Search on Bibsonomy SecureComm The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Deepali Arora, Teghan Godkin, Adam Verigin, Stephen W. Neville Empirical Evidence for Non-equilibrium Behaviors within Peer-to-Peer Structured Botnets. Search on Bibsonomy BWCCA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Tianzuo Wang, Huaimin Wang, Bo Liu, Peichang Shi Model the Influence of Sybil Nodes in P2P Botnets. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Arian Bär, Antonio Paciello, Peter Romirer-Maierhofer Trapping botnets by DNS failure graphs: Validation, extension and application to a 3G network. Search on Bibsonomy INFOCOM Workshops The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Arian Bär, Antonio Paciello, Peter Romirer-Maierhofer Trapping botnets by DNS failure graphs: Validation, extension and application to a 3G network. Search on Bibsonomy INFOCOM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Christian Rossow, Christian J. Dietrich ProVeX: Detecting Botnets with Encrypted Command and Control Channels. Search on Bibsonomy DIMVA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Christian Rossow, Dennis Andriesse, Tillmann Werner, Brett Stone-Gross, Daniel Plohmann, Christian J. Dietrich, Herbert Bos SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Igor V. Kotenko Experiments With Simulation Of Botnets And Defense Agent Teams. Search on Bibsonomy ECMS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Dennis Andriesse, Christian Rossow, Brett Stone-Gross, Daniel Plohmann, Herbert Bos Highly resilient peer-to-peer botnets are here: An analysis of Gameover Zeus. Search on Bibsonomy MALWARE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Danny Bradbury Fighting botnets with sinkholes. Search on Bibsonomy Netw. Secur. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Igor V. Kotenko, Alexey Konovalov, Andrey Shorov Agent-based simulation of cooperative defence against botnets. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Hyunsang Choi, Heejo Lee Identifying botnets by capturing group activities in DNS traffic. Search on Bibsonomy Comput. Networks The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Manoj Rameshchandra Thakur, Divye Raj Khilnani, Kushagra Gupta, Sandeep Jain, Vineet Agarwal, Suneeta Sane, Sugata Sanyal, Prabhakar S. Dhekne Detection and prevention of botnets and malware in an enterprise network. Search on Bibsonomy Int. J. Wirel. Mob. Comput. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Alper K. Caglayan, Mike Toothaker, Dan Drapeau, Dustin Burke, Gerry Eaton Behavioral analysis of botnets for threat intelligence. Search on Bibsonomy Inf. Syst. E Bus. Manag. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Tianzuo Wang, Huaimin Wang, Bo Liu 0014, Bo Ding, Jing Zhang, Peichang Shi Further Analyzing the Sybil Attack in Mitigating Peer-to-Peer Botnets. Search on Bibsonomy KSII Trans. Internet Inf. Syst. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Nuno Rodrigues, Rui Sousa, Paulo Salvador Ferreira, António Manuel Duarte Nogueira Characterization and Modeling of Top Spam Botnets. Search on Bibsonomy Netw. Protoc. Algorithms The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Michael Brian Pope, Merrill Warkentin, Xin (Robert) Luo Evolutionary Malware: Mobile Malware, Botnets, and Malware Toolkits. Search on Bibsonomy Int. J. Wirel. Networks Broadband Technol. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Peter Haider, Tobias Scheffer Finding Botnets Using Minimal Graph Clusterings Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
18Fuye Han, Zhen Chen, HongFeng Xu, Haopei Wang, Yong Liang A collaborative botnets suppression system based on overlay network. Search on Bibsonomy Int. J. Secur. Networks The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Samuel Greengard The war against botnets. Search on Bibsonomy Commun. ACM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Axelle Apvrille Symbian worm Yxes: towards mobile botnets? Search on Bibsonomy J. Comput. Virol. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Young-Hoon Moon, Eunjin Kim, Suh Mahn Hur, Huy Kang Kim Detection of botnets before activation: an enhanced honeypot system for intentional infection and behavioral observation of malware. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Aaron Martin, Norberto Nuno Gomes de Andrade Battling Botnets with Digital Rights in Mind. Search on Bibsonomy Eur. J. Law Technol. The full citation details ... 2012 DBLP  BibTeX  RDF
18Deepali Arora, Teghan Godkin, Adam Verigin, Stephen W. Neville Assessing Trade-Offs between Stealthiness and Node Recruitment Rates in Peer-to-Peer Botnets. Search on Bibsonomy 3PGCIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Xiang Cui, Binxing Fang, Peng Liao, Chaoge Liu Advanced triple-channel botnets: model and implementation. Search on Bibsonomy CCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Luís Mendonça, Henrique Santos 0001 Botnets: a heuristic-based detection framework. Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Igor V. Kotenko, Andrey Shorov Simulation of Protection Mechanisms against Botnets on the Basis of "Nervous Network" Framework. Search on Bibsonomy SIMULTECH The full citation details ... 2012 DBLP  BibTeX  RDF
18Rui Sousa, Nuno Rodrigues, Paulo Salvador 0001, António Nogueira Analyzing the behavior of top spam botnets. Search on Bibsonomy ICC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Shuai Wang, Xiang Cui, Peng Liao, Dan Li S-URL Flux: A Novel C&C Protocol for Mobile Botnets. Search on Bibsonomy ISCTCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Xiaobo Ma, Jianfeng Li, Jing Tao, Xiaohong Guan Towards active measurement for DNS query behavior of botnets. Search on Bibsonomy GLOBECOM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Heloise Pieterse, Martin S. Olivier Android botnets on the rise: Trends and characteristics. Search on Bibsonomy ISSA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Xiang Cui, Jinqiao Shi, Peng Liao, Chaoge Liu The Triple-Channel Model: Toward Robust and Efficient Advanced Botnets (Poster Abstract). Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Matthew Knysz, Xin Hu 0001, Yuanyuan Zeng, Kang G. Shin Open WiFi networks: Lethal weapons for botnets? Search on Bibsonomy INFOCOM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Shui Yu 0001, Song Guo 0001, Ivan Stojmenovic Can we beat legitimate cyber behavior mimicking attacks from botnets? Search on Bibsonomy INFOCOM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Fuye Han, Zhen Chen, HongFeng Xu, Yong Liang Garlic: A Distributed Botnets Suppression System. Search on Bibsonomy ICDCS Workshops The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Biao Jiang, Eul Gyu Im, Yunmo Koo SaaS-Driven Botnets. Search on Bibsonomy PAISI The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Peter Haider, Tobias Scheffer Finding Botnets Using Minimal Graph Clusterings. Search on Bibsonomy ICML The full citation details ... 2012 DBLP  BibTeX  RDF
18Shuang Zhao, Patrick P. C. Lee, John C. S. Lui, Xiaohong Guan, Xiaobo Ma, Jing Tao Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Dmitry P. Zegzhda, Tatiana V. Stepanova Stochastic Model of Interaction between Botnets and Distributed Computer Defense Systems. Search on Bibsonomy MMM-ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Yuanyuan Zeng, Kang G. Shin, Xin Hu 0001 Design of SMS commanded-and-controlled and P2P-structured mobile botnets. Search on Bibsonomy WISEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Yuanyuan Zeng On Detection of Current and Next-Generation Botnets. Search on Bibsonomy 2012   RDF
18Ok-Ran Jeong, Chulyun Kim, Won Kim 0001, Jungmin So Botnets: threats and responses. Search on Bibsonomy Int. J. Web Inf. Syst. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Steve Gold Taking down botnets. Search on Bibsonomy Netw. Secur. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Guanhua Yan, Duc T. Ha, Stephan J. Eidenbenz AntBot: Anti-pollution peer-to-peer botnets. Search on Bibsonomy Comput. Networks The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Wajeb Gharibi, Abdulrahman Mirza Software Vulnerabilities, Banking Threats, Botnets and Malware Self-Protection Technologies Search on Bibsonomy CoRR The full citation details ... 2011 DBLP  BibTeX  RDF
18Zhen Li 0025, Qi Liao 0002, Andrew Blaich, Aaron Striegel Fighting botnets with economic uncertainty. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Junjie Zhang 0004, Roberto Perdisci, Wenke Lee, Unum Sarfraz, Xiapu Luo Detecting stealthy P2P botnets using statistical traffic fingerprints. Search on Bibsonomy DSN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Peng Liao, Xiang Cui, Shuhao Li, Chaoge Liu Poster: recoverable botnets: a hybrid C&C approach. Search on Bibsonomy CCS The full citation details ... 2011 DBLP  BibTeX  RDF
18Eric Koziel, David Robinson Botnets as an Instrument of Warfare. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Jérôme François, Shaonan Wang, Walter Bronzi, Radu State, Thomas Engel 0001 BotCloud: Detecting botnets using MapReduce. Search on Bibsonomy WIFS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Jérôme François, Shaonan Wang, Radu State, Thomas Engel 0001 BotTrack: Tracking Botnets Using NetFlow and PageRank. Search on Bibsonomy Networking (1) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Rafael Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro Garcia-Teodoro Analysis of Botnets through Life-cycle. Search on Bibsonomy SECRYPT The full citation details ... 2011 DBLP  BibTeX  RDF
18Kassidy P. Clark, Martijn Warnier, Frances M. T. Brazier Botclouds - The Future of Cloud-based Botnets? Search on Bibsonomy CLOSER The full citation details ... 2011 DBLP  BibTeX  RDF
18Christian J. Dietrich, Christian Rossow, Felix C. Freiling, Herbert Bos, Maarten van Steen, Norbert Pohlmann On Botnets That Use DNS for Command and Control. Search on Bibsonomy EC2ND The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Ickin Vural, Hein S. Venter Detecting Mobile Spam Botnets Using Artificial immune Systems. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Yuanyuan Zeng, Guanhua Yan, Stephan J. Eidenbenz, Kang G. Shin Measuring the effectiveness of infrastructure-level detection of large-scale botnets. Search on Bibsonomy IWQoS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Jungsuk Song, Jumpei Shimamura, Masashi Eto, Daisuke Inoue, Koji Nakao Correlation Analysis between Spamming Botnets and Malware Infected Hosts. Search on Bibsonomy SAINT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF darknet, spam, malware, honeypot, botnet, correlation analysis
18Guanhua Yan, Songqing Chen, Stephan J. Eidenbenz RatBot: Anti-enumeration Peer-to-Peer Botnets. Search on Bibsonomy ISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Xin Hu 0001, Matthew Knysz, Kang G. Shin Measurement and analysis of global IP-usage patterns of fast-flux botnets. Search on Bibsonomy INFOCOM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Olivier Thonnard, Marc Dacier A strategic analysis of spam botnets operations. Search on Bibsonomy CEAS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Xiang Cui, Binxing Fang, Lihua Yin, Xiaoyi Liu, Tianning Zang Andbot: Towards Advanced Mobile Botnets. Search on Bibsonomy LEET The full citation details ... 2011 DBLP  BibTeX  RDF
18Sherif Saad, Issa Traoré, Ali A. Ghorbani 0001, Bassam Sayed, David Zhao, Wei Lu 0018, John Felix, Payman Hakimian Detecting P2P botnets through network behavior analysis and machine learning. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Peter Martini Botnets - Detection, classification and countermeasures. Search on Bibsonomy LCN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Shuhao Li, Xiao-chun Yun, Zhiyu Hao, Xiang Cui, Yipeng Wang 0001 A Propagation Model for Social Engineering Botnets in Social Networks. Search on Bibsonomy PDCAT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Ping Wang, Baber Aslam, Cliff Changchun Zou Peer-to-Peer Botnets. Search on Bibsonomy Handbook of Information and Communication Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Claire Elliott Botnets: To what extent are they a threat to information security? Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Zhiyong Huang, Xiaoping Zeng, Yong Liu 0013 Detecting and blocking P2P botnets through contact tracing chains. Search on Bibsonomy Int. J. Internet Protoc. Technol. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Steve Mansfield-Devine Battle of the botnets. Search on Bibsonomy Netw. Secur. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Yoon-Ho Choi, Peng Liu 0005, Seung-Woo Seo Creation of the importance scanning worm using information collected by Botnets. Search on Bibsonomy Comput. Commun. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Yousof Al-Hammadi, Uwe Aickelin Detecting Botnets Through Log Correlation Search on Bibsonomy CoRR The full citation details ... 2010 DBLP  BibTeX  RDF
18Zesheng Chen, Chao Chen 0001, Qian Wang On the scalability of Delay-Tolerant Botnets. Search on Bibsonomy Int. J. Secur. Networks The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Alexander K. Seewald, Wilfried N. Gansterer On the detection and identification of botnets. Search on Bibsonomy Comput. Secur. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Yuanyuan Zeng, Xin Hu 0001, Kang G. Shin Detection of botnets using combined host- and network-level information. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18David Dittrich, Felix Leder, Tillmann Werner A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets. Search on Bibsonomy Financial Cryptography Workshops The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Yan Jia 0001, Runheng Li, Liang Gan, Guangqiang Chen IRC Botnets' Homology Identifying Method Based on Improved LB_PAA Distance of Communication Characteristic Curves. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF dynamic time warping distance, LB_PAA, communication, botnet, homologous
18Marco Ajelli, Renato Lo Cigno, Alberto Montresor Modeling Botnets and Epidemic Malware. Search on Bibsonomy ICC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Andrew White, Alan Tickle, Andrew J. Clark Overcoming Reputation and Proof-of-Work Systems in Botnets. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Nur Rohman Rosyid, Masayuki Ohrui, Hiroaki Kikuchi, Pitikhate Sooraksa, Masato Terada A discovery of sequential attack patterns of malware in botnets. Search on Bibsonomy SMC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Brent Rowe, Dallas Wood, Douglas S. Reeves How the Public Views Strategies Designed to Reduce the Threat of Botnets. Search on Bibsonomy TRUST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Igor V. Kotenko, Alexey Konovalov, Andrey Shorov Simulation of Botnets: Agent-Based Approach. Search on Bibsonomy IDC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Won Kim 0001, Ok-Ran Jeong, Chulyun Kim, Jungmin So On botnets. Search on Bibsonomy iiWAS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Baris Coskun, Sven Dietrich, Nasir D. Memon Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Jérôme François, Radu State, Olivier Festor Botnets IRC et P2P pour une supervision à large échelle. Search on Bibsonomy Tech. Sci. Informatiques The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Srdjan Stankovic, Dejan Simic Defense Strategies Against Modern Botnets Search on Bibsonomy CoRR The full citation details ... 2009 DBLP  BibTeX  RDF
18Basil AsSadhan, José M. F. Moura, David E. Lapsley, Christine E. Jones, W. Timothy Strayer Detecting Botnets Using Command and Control Traffic. Search on Bibsonomy NCA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Botnet detection, discrete time series analysis, periodogram, Walker large sample test, SLINGbot
18Duc T. Ha, Guanhua Yan, Stephan J. Eidenbenz, Hung Q. Ngo 0001 On the effectiveness of structural detection and defense against P2P-based botnets. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent Jaeger, Patrick D. McDaniel, Thomas La Porta On cellular botnets: measuring the impact of malicious devices on a cellular network core. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF mobile phones, denial-of-service, telecommunications
18Sang-Kyun Noh, Joo-Hyung Oh, Jae-Seo Lee, Bong-Nam Noh, Hyun-Cheol Jeong Detecting P2P Botnets Using a Multi-phased Flow Model. Search on Bibsonomy ICDS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Miroslaw Szymczyk Detecting Botnets in Computer Networks Using Multi-agent Technology. Search on Bibsonomy DepCoS-RELCOMEX The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Kyle Smith, Ehab Al-Shaer, Khalid Elbadawi Information Theoretic Approach for Characterizing Spam Botnets Based on Traffic Properties. Search on Bibsonomy ICC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Xin Hu 0001, Matthew Knysz, Kang G. Shin RB-Seeker: Auto-detection of Redirection Botnets. Search on Bibsonomy NDSS The full citation details ... 2009 DBLP  BibTeX  RDF
18Byungseung Kim, Hyogon Kim, Saewoong Bahk NSF: Network-Based Spam Filtering Based on On-Line Blacklisting against Spamming Botnets. Search on Bibsonomy GLOBECOM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18John P. John, Alexander Moshchuk, Steven D. Gribble, Arvind Krishnamurthy Studying Spamming Botnets Using Botlab. Search on Bibsonomy NSDI The full citation details ... 2009 DBLP  BibTeX  RDF
Displaying result #301 - #400 of 463 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license