|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 128 occurrences of 71 keywords
|
|
|
Results
Found 463 publication records. Showing 463 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
18 | Ping Wang, Lei Wu, Baber Aslam, Cliff Changchun Zou |
A Systematic Study on Peer-to-Peer Botnets. |
ICCCN |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Zesheng Chen, Chao Chen 0001, Qian Wang |
Delay-Tolerant Botnets. |
ICCCN |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Hyunsang Choi, Heejo Lee, Hyogon Kim |
BotGAD: detecting botnets by capturing group activities in network traffic. |
COMSWARE |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Junfeng Yu, Zhitang Li, Jun Hu, Feng Liu, Lingyun Zhou |
Using Simulation to Characterize Topology of Peer to Peer Botnets. |
ICCMS |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Márk Jelasity, Vilmos Bilicki |
Towards Automated Detection of Peer-to-Peer Botnets: On the Limits of Local Approaches. |
LEET |
2009 |
DBLP BibTeX RDF |
|
18 | Carlton R. Davis, José M. Fernandez 0001, Stephen Neville |
Optimising sybil attacks against P2P-based botnets. |
MALWARE |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Colin Dixon, Thomas E. Anderson, Arvind Krishnamurthy |
Withstanding Multimillion-node Botnets. |
login Usenix Mag. |
2008 |
DBLP BibTeX RDF |
|
18 | John Bambenek, Agnes Klus |
Botnets and Proactive System Defense. |
Botnet Detection |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Xin Liu 0059, Xiaowei Yang 0001, Yanbin Lu |
To filter or to authorize: network-layer DoS defense against multimillion-node botnets. |
SIGCOMM |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Yinglian Xie, Fang Yu 0002, Kannan Achan, Rina Panigrahy, Geoff Hulten, Ivan Osipkov |
Spamming botnets: signatures and characteristics. |
SIGCOMM |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Wei Lu 0018, Ali A. Ghorbani 0001 |
Botnets Detection Based on IRC-Community. |
GLOBECOM |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Duc T. Ha, Hung Q. Ngo 0001, Madhusudhanan Chandrasekaran |
CRESTBOT: A New Family of Resilient Botnets. |
GLOBECOM |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Colin Dixon, Thomas E. Anderson, Arvind Krishnamurthy |
Phalanx: Withstanding Multimillion-Node Botnets. |
NSDI |
2008 |
DBLP BibTeX RDF |
|
18 | Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst W. Biersack, Felix C. Freiling |
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm. |
LEET |
2008 |
DBLP BibTeX RDF |
|
18 | Li Zhuang, John Dunagan, Daniel R. Simon, Helen J. Wang, Ivan Osipkov, J. Doug Tygar |
Characterizing Botnets from Email Spam Records. |
LEET |
2008 |
DBLP BibTeX RDF |
|
18 | Ricardo Villamarín-Salomón, Jose Carlos Brustoloni |
Identifying Botnets Using Anomaly Detection Techniques Applied to DNS Traffic. |
CCNC |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Husain Husna, Santi Phithakkitnukoon, Ram Dantu |
Traffic Shaping of Spam Botnets. |
CCNC |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Paul Barford, Vinod Yegneswaran |
An Inside Look at Botnets. |
Malware Detection |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Ryan Vogt, John Aycock, Michael J. Jacobson Jr. |
Army of Botnets. |
NDSS |
2007 |
DBLP BibTeX RDF |
|
18 | Niels Provos (eds.) |
First Workshop on Hot Topics in Understanding Botnets, HotBots'07, Cambridge, MA, USA, April 10, 2007 |
HotBots |
2007 |
DBLP BibTeX RDF |
|
18 | Erwin Louis Carrow |
Puppetnets and botnets: information technology vulnerability exploits that threaten basic internet use. |
InfoSecCD |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Daniel R. Simon, Sharad Agarwal, David A. Maltz |
AS-Based Accountability as a Cost-Effective DDoS Defense. |
HotBots |
2007 |
DBLP BibTeX RDF |
|
18 | Neil Daswani, Michael Stoppelman |
The Anatomy of Clickbot.A. |
HotBots |
2007 |
DBLP BibTeX RDF |
|
18 | Alex Brodsky, Dmitry Brodsky |
A Distributed Content Independent Method for Spam Detection. |
HotBots |
2007 |
DBLP BibTeX RDF |
|
18 | Ken Chiang, Levi Lloyd |
A Case Study of the Rustock Rootkit and Spam Bot. |
HotBots |
2007 |
DBLP BibTeX RDF |
|
18 | Niels Provos, Dean McNamee, Panayiotis Mavrommatis, Ke Wang 0009, Nagendra Modadugu |
The Ghost in the Browser: Analysis of Web-based Malware. |
HotBots |
2007 |
DBLP BibTeX RDF |
|
18 | Anestis Karasaridis, Brian Rexroad, David A. Hoeflin |
Wide-Scale Botnet Detection and Characterization. |
HotBots |
2007 |
DBLP BibTeX RDF |
|
18 | Paul Barford, Mike Blodgett |
Toward Botnet Mesocosms. |
HotBots |
2007 |
DBLP BibTeX RDF |
|
18 | Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis |
My Botnet Is Bigger Than Yours (Maybe, Better Than Yours): Why Size Estimates Remain Challenging. |
HotBots |
2007 |
DBLP BibTeX RDF |
|
18 | Jan Goebel, Thorsten Holz |
Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation. |
HotBots |
2007 |
DBLP BibTeX RDF |
|
18 | Ping Wang, Sherri Sparks, Cliff C. Zou |
An Advanced Hybrid Peer-to-Peer Botnet. |
HotBots |
2007 |
DBLP BibTeX RDF |
|
18 | Gregory P. Schaffer |
Worms and viruses and botnets, oh my! Rational responses to emerging Internet threats. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Dmitri Alperovitch |
Zombies and Botnets: Attacks on Messaging Security by Organized Criminal Enterprises. |
LISA |
2006 |
DBLP BibTeX RDF |
|
18 | Richard Ford, Sarah Gordon |
Cent, five cent, ten cent, dollar: hitting botnets where it really hurts. |
NSPW |
2006 |
DBLP DOI BibTeX RDF |
business models, worm, virus, spyware, malicious code, adware |
18 | Evan Cooke, Farnam Jahanian |
The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets. |
SRUTI |
2005 |
DBLP BibTeX RDF |
|
18 | Bill McCarty |
Botnets: Big and Bigger. |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
honeypot, botnet, honeynet |
16 | Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage |
Spamalytics: an empirical analysis of spam marketing conversion. |
Commun. ACM |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Brent ByungHoon Kang, Eric Chan-Tin, Christopher P. Lee 0001, James Tyra, Hun Jeong Kang, Chris Nunnery, Zachariah Wadler, Greg Sinclair, Nicholas Hopper, David Dagon, Yongdae Kim |
Towards complete node enumeration in a peer-to-peer botnet. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
infected hosts enumeration, storm, P2P, botnet |
16 | Zhichun Li, Anup Goyal, Yan Chen 0004, Vern Paxson |
Automating analysis of large-scale botnet probing events. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
global property extrapolation, scan strategy inference, situational awareness, botnet, statistical inference, honeynet |
16 | Juan Caballero, Pongsin Poosankam, Christian Kreibich, Dawn Xiaodong Song |
Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
botnet infiltration, protocol reverse engineering, binary analysis |
16 | Márk Jelasity, Vilmos Bilicki |
Scalable P2P Overlays of Very Small Constant Degree: An Emerging Security Threat. |
SSS |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Olivier Thonnard, Wim Mees, Marc Dacier |
Addressing the attack attribution problem using knowledge discovery and multi-criteria fuzzy decision-making. |
KDD Workshop on CyberSecurity and Intelligence Informatics |
2009 |
DBLP DOI BibTeX RDF |
attack attribution, intelligence monitoring and analysis |
16 | Abhinav Pathak, Feng Qian 0001, Y. Charlie Hu, Zhuoqing Morley Mao, Supranamaya Ranjan |
Botnet spam campaigns can be long lasting: evidence, implications, and analysis. |
SIGMETRICS/Performance |
2009 |
DBLP DOI BibTeX RDF |
distributedness, open relay, spam campaign, botnet, burstiness |
16 | Manuel Egele, Peter Wurzinger, Christopher Kruegel, Engin Kirda |
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks. |
DIMVA |
2009 |
DBLP DOI BibTeX RDF |
malicious script, shellcode, emulation, Drive-by download |
16 | Lance Stout, Michael A. Murphy, Sebastien Goasguen |
Kestrel: an XMPP-based framework for many task computing applications. |
SC-MTAGS |
2009 |
DBLP DOI BibTeX RDF |
cluster, scheduling, grid, distributed, XMPP, MTC |
16 | Lee Garber |
News Briefs. |
Computer |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Xu Chen, Jonathon Andersen, Zhuoqing Morley Mao, Michael D. Bailey, Jose Nazario |
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware. |
DSN |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Brandon Shirley, Chad D. Mano |
A Model for Covert Botnet Communication in a Private Subnet. |
Networking |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Jérôme François, Radu State, Olivier Festor |
Towards malware inspired management frameworks. |
NOMS |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Wei Lu 0018, Ali A. Ghorbani 0001 |
Bots Behaviors vs. Human Behaviors on Large-Scale Communication Networks (Extended Abstract). |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Ting-Fang Yen, Michael K. Reiter |
Traffic Aggregation for Malware Detection. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Steven J. Murdoch, Robert N. M. Watson |
Metrics for Security and Performance in Low-Latency Anonymity Systems. |
Privacy Enhancing Technologies |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Florian Mansmann, Daniel A. Keim, Stephen C. North, Brian Rexroad, Daniel Sheleheda |
Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats. |
IEEE Trans. Vis. Comput. Graph. |
2007 |
DBLP DOI BibTeX RDF |
Information visualization, network security, network monitoring, treemap |
16 | Yu Jin 0001, Esam Sharafuddin, Zhi-Li Zhang |
Identifying dynamic IP address blocks serendipitously through background scanning traffic. |
CoNEXT |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Michael D. Bailey, Jon Oberheide, Jon Andersen, Zhuoqing Morley Mao, Farnam Jahanian, Jose Nazario |
Automated Classification and Analysis of Internet Malware. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Jérôme François, Radu State, Olivier Festor |
Malware Models for Network and Service Management. (PDF / PS) |
AIMS |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Jan Goebel, Thorsten Holz, Carsten Willems |
Measurement and Analysis of Autonomous Spreading Malware in a University Environment. |
DIMVA |
2007 |
DBLP DOI BibTeX RDF |
Malware, Honeypots, Invasive Software |
16 | Napoleon Paxton, Gail-Joon Ahn, Bill Chu |
Towards Practical Framework for Collecting and Analyzing Network-Centric Attacks. |
IRI |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Phillip A. Porras |
Privacy-Enabled Global Threat Monitoring. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Anirudh Ramachandran, Nick Feamster |
Understanding the network-level behavior of spammers. |
SIGCOMM |
2006 |
DBLP DOI BibTeX RDF |
security, network management, spam, BGP, botnet |
16 | Ying Zhang 0022, Evan Cooke, Zhuoqing Morley Mao |
Internet-scale malware mitigation: combining intelligence of the control and data plane. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
internet motion sensor, routing anomaly, network security, BGP, computer worms |
16 | Thorsten Holz |
A Short Visit to the Bot Zoo. |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Felix C. Freiling, Thorsten Holz, Georg Wicherski |
Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #401 - #463 of 463 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5] |
|