The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Botnets with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2003-2006 (16) 2007 (31) 2008 (30) 2009 (36) 2010 (21) 2011 (25) 2012 (32) 2013 (28) 2014 (23) 2015 (24) 2016 (15) 2017 (19) 2018 (39) 2019 (35) 2020 (28) 2021 (17) 2022 (31) 2023-2024 (13)
Publication types (Num. hits)
article(162) book(2) incollection(4) inproceedings(289) phdthesis(5) proceedings(1)
Venues (Conferences, Journals, ...)
CoRR(32) HotBots(12) CCS(9) Comput. Secur.(9) ARES(8) ICC(8) Comput. Networks(7) DSN(7) GLOBECOM(7) Computer(6) IEEE Secur. Priv.(6) INFOCOM(6) DIMVA(5) IEEE Access(5) Netw. Secur.(5) SBRC(5) More (+10 of total 255)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 128 occurrences of 71 keywords

Results
Found 463 publication records. Showing 463 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
18Ping Wang, Lei Wu, Baber Aslam, Cliff Changchun Zou A Systematic Study on Peer-to-Peer Botnets. Search on Bibsonomy ICCCN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Zesheng Chen, Chao Chen 0001, Qian Wang Delay-Tolerant Botnets. Search on Bibsonomy ICCCN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Hyunsang Choi, Heejo Lee, Hyogon Kim BotGAD: detecting botnets by capturing group activities in network traffic. Search on Bibsonomy COMSWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Junfeng Yu, Zhitang Li, Jun Hu, Feng Liu, Lingyun Zhou Using Simulation to Characterize Topology of Peer to Peer Botnets. Search on Bibsonomy ICCMS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Márk Jelasity, Vilmos Bilicki Towards Automated Detection of Peer-to-Peer Botnets: On the Limits of Local Approaches. Search on Bibsonomy LEET The full citation details ... 2009 DBLP  BibTeX  RDF
18Carlton R. Davis, José M. Fernandez 0001, Stephen Neville Optimising sybil attacks against P2P-based botnets. Search on Bibsonomy MALWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Colin Dixon, Thomas E. Anderson, Arvind Krishnamurthy Withstanding Multimillion-node Botnets. Search on Bibsonomy login Usenix Mag. The full citation details ... 2008 DBLP  BibTeX  RDF
18John Bambenek, Agnes Klus Botnets and Proactive System Defense. Search on Bibsonomy Botnet Detection The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Xin Liu 0059, Xiaowei Yang 0001, Yanbin Lu To filter or to authorize: network-layer DoS defense against multimillion-node botnets. Search on Bibsonomy SIGCOMM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Yinglian Xie, Fang Yu 0002, Kannan Achan, Rina Panigrahy, Geoff Hulten, Ivan Osipkov Spamming botnets: signatures and characteristics. Search on Bibsonomy SIGCOMM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Wei Lu 0018, Ali A. Ghorbani 0001 Botnets Detection Based on IRC-Community. Search on Bibsonomy GLOBECOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Duc T. Ha, Hung Q. Ngo 0001, Madhusudhanan Chandrasekaran CRESTBOT: A New Family of Resilient Botnets. Search on Bibsonomy GLOBECOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Colin Dixon, Thomas E. Anderson, Arvind Krishnamurthy Phalanx: Withstanding Multimillion-Node Botnets. Search on Bibsonomy NSDI The full citation details ... 2008 DBLP  BibTeX  RDF
18Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst W. Biersack, Felix C. Freiling Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm. Search on Bibsonomy LEET The full citation details ... 2008 DBLP  BibTeX  RDF
18Li Zhuang, John Dunagan, Daniel R. Simon, Helen J. Wang, Ivan Osipkov, J. Doug Tygar Characterizing Botnets from Email Spam Records. Search on Bibsonomy LEET The full citation details ... 2008 DBLP  BibTeX  RDF
18Ricardo Villamarín-Salomón, Jose Carlos Brustoloni Identifying Botnets Using Anomaly Detection Techniques Applied to DNS Traffic. Search on Bibsonomy CCNC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Husain Husna, Santi Phithakkitnukoon, Ram Dantu Traffic Shaping of Spam Botnets. Search on Bibsonomy CCNC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Paul Barford, Vinod Yegneswaran An Inside Look at Botnets. Search on Bibsonomy Malware Detection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Ryan Vogt, John Aycock, Michael J. Jacobson Jr. Army of Botnets. Search on Bibsonomy NDSS The full citation details ... 2007 DBLP  BibTeX  RDF
18Niels Provos (eds.) First Workshop on Hot Topics in Understanding Botnets, HotBots'07, Cambridge, MA, USA, April 10, 2007 Search on Bibsonomy HotBots The full citation details ... 2007 DBLP  BibTeX  RDF
18Erwin Louis Carrow Puppetnets and botnets: information technology vulnerability exploits that threaten basic internet use. Search on Bibsonomy InfoSecCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Daniel R. Simon, Sharad Agarwal, David A. Maltz AS-Based Accountability as a Cost-Effective DDoS Defense. Search on Bibsonomy HotBots The full citation details ... 2007 DBLP  BibTeX  RDF
18Neil Daswani, Michael Stoppelman The Anatomy of Clickbot.A. Search on Bibsonomy HotBots The full citation details ... 2007 DBLP  BibTeX  RDF
18Alex Brodsky, Dmitry Brodsky A Distributed Content Independent Method for Spam Detection. Search on Bibsonomy HotBots The full citation details ... 2007 DBLP  BibTeX  RDF
18Ken Chiang, Levi Lloyd A Case Study of the Rustock Rootkit and Spam Bot. Search on Bibsonomy HotBots The full citation details ... 2007 DBLP  BibTeX  RDF
18Niels Provos, Dean McNamee, Panayiotis Mavrommatis, Ke Wang 0009, Nagendra Modadugu The Ghost in the Browser: Analysis of Web-based Malware. Search on Bibsonomy HotBots The full citation details ... 2007 DBLP  BibTeX  RDF
18Anestis Karasaridis, Brian Rexroad, David A. Hoeflin Wide-Scale Botnet Detection and Characterization. Search on Bibsonomy HotBots The full citation details ... 2007 DBLP  BibTeX  RDF
18Paul Barford, Mike Blodgett Toward Botnet Mesocosms. Search on Bibsonomy HotBots The full citation details ... 2007 DBLP  BibTeX  RDF
18Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis My Botnet Is Bigger Than Yours (Maybe, Better Than Yours): Why Size Estimates Remain Challenging. Search on Bibsonomy HotBots The full citation details ... 2007 DBLP  BibTeX  RDF
18Jan Goebel, Thorsten Holz Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation. Search on Bibsonomy HotBots The full citation details ... 2007 DBLP  BibTeX  RDF
18Ping Wang, Sherri Sparks, Cliff C. Zou An Advanced Hybrid Peer-to-Peer Botnet. Search on Bibsonomy HotBots The full citation details ... 2007 DBLP  BibTeX  RDF
18Gregory P. Schaffer Worms and viruses and botnets, oh my! Rational responses to emerging Internet threats. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Dmitri Alperovitch Zombies and Botnets: Attacks on Messaging Security by Organized Criminal Enterprises. Search on Bibsonomy LISA The full citation details ... 2006 DBLP  BibTeX  RDF
18Richard Ford, Sarah Gordon Cent, five cent, ten cent, dollar: hitting botnets where it really hurts. Search on Bibsonomy NSPW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF business models, worm, virus, spyware, malicious code, adware
18Evan Cooke, Farnam Jahanian The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets. Search on Bibsonomy SRUTI The full citation details ... 2005 DBLP  BibTeX  RDF
18Bill McCarty Botnets: Big and Bigger. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF honeypot, botnet, honeynet
16Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage Spamalytics: an empirical analysis of spam marketing conversion. Search on Bibsonomy Commun. ACM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Brent ByungHoon Kang, Eric Chan-Tin, Christopher P. Lee 0001, James Tyra, Hun Jeong Kang, Chris Nunnery, Zachariah Wadler, Greg Sinclair, Nicholas Hopper, David Dagon, Yongdae Kim Towards complete node enumeration in a peer-to-peer botnet. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF infected hosts enumeration, storm, P2P, botnet
16Zhichun Li, Anup Goyal, Yan Chen 0004, Vern Paxson Automating analysis of large-scale botnet probing events. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF global property extrapolation, scan strategy inference, situational awareness, botnet, statistical inference, honeynet
16Juan Caballero, Pongsin Poosankam, Christian Kreibich, Dawn Xiaodong Song Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF botnet infiltration, protocol reverse engineering, binary analysis
16Márk Jelasity, Vilmos Bilicki Scalable P2P Overlays of Very Small Constant Degree: An Emerging Security Threat. Search on Bibsonomy SSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Olivier Thonnard, Wim Mees, Marc Dacier Addressing the attack attribution problem using knowledge discovery and multi-criteria fuzzy decision-making. Search on Bibsonomy KDD Workshop on CyberSecurity and Intelligence Informatics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF attack attribution, intelligence monitoring and analysis
16Abhinav Pathak, Feng Qian 0001, Y. Charlie Hu, Zhuoqing Morley Mao, Supranamaya Ranjan Botnet spam campaigns can be long lasting: evidence, implications, and analysis. Search on Bibsonomy SIGMETRICS/Performance The full citation details ... 2009 DBLP  DOI  BibTeX  RDF distributedness, open relay, spam campaign, botnet, burstiness
16Manuel Egele, Peter Wurzinger, Christopher Kruegel, Engin Kirda Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks. Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF malicious script, shellcode, emulation, Drive-by download
16Lance Stout, Michael A. Murphy, Sebastien Goasguen Kestrel: an XMPP-based framework for many task computing applications. Search on Bibsonomy SC-MTAGS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cluster, scheduling, grid, distributed, XMPP, MTC
16Lee Garber News Briefs. Search on Bibsonomy Computer The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Xu Chen, Jonathon Andersen, Zhuoqing Morley Mao, Michael D. Bailey, Jose Nazario Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Brandon Shirley, Chad D. Mano A Model for Covert Botnet Communication in a Private Subnet. Search on Bibsonomy Networking The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Jérôme François, Radu State, Olivier Festor Towards malware inspired management frameworks. Search on Bibsonomy NOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Wei Lu 0018, Ali A. Ghorbani 0001 Bots Behaviors vs. Human Behaviors on Large-Scale Communication Networks (Extended Abstract). Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Ting-Fang Yen, Michael K. Reiter Traffic Aggregation for Malware Detection. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Steven J. Murdoch, Robert N. M. Watson Metrics for Security and Performance in Low-Latency Anonymity Systems. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Florian Mansmann, Daniel A. Keim, Stephen C. North, Brian Rexroad, Daniel Sheleheda Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats. Search on Bibsonomy IEEE Trans. Vis. Comput. Graph. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Information visualization, network security, network monitoring, treemap
16Yu Jin 0001, Esam Sharafuddin, Zhi-Li Zhang Identifying dynamic IP address blocks serendipitously through background scanning traffic. Search on Bibsonomy CoNEXT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Michael D. Bailey, Jon Oberheide, Jon Andersen, Zhuoqing Morley Mao, Farnam Jahanian, Jose Nazario Automated Classification and Analysis of Internet Malware. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Jérôme François, Radu State, Olivier Festor Malware Models for Network and Service Management. (PDF / PS) Search on Bibsonomy AIMS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Jan Goebel, Thorsten Holz, Carsten Willems Measurement and Analysis of Autonomous Spreading Malware in a University Environment. Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Malware, Honeypots, Invasive Software
16Napoleon Paxton, Gail-Joon Ahn, Bill Chu Towards Practical Framework for Collecting and Analyzing Network-Centric Attacks. Search on Bibsonomy IRI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Phillip A. Porras Privacy-Enabled Global Threat Monitoring. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Anirudh Ramachandran, Nick Feamster Understanding the network-level behavior of spammers. Search on Bibsonomy SIGCOMM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, network management, spam, BGP, botnet
16Ying Zhang 0022, Evan Cooke, Zhuoqing Morley Mao Internet-scale malware mitigation: combining intelligence of the control and data plane. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF internet motion sensor, routing anomaly, network security, BGP, computer worms
16Thorsten Holz A Short Visit to the Bot Zoo. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Felix C. Freiling, Thorsten Holz, Georg Wicherski Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #463 of 463 (100 per page; Change: )
Pages: [<<][1][2][3][4][5]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license