DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Kraken botnet
Kraken botnet
Analysis of Malware and Domain Name System Traffic
An Analysis of the Asprox Botnet
Detecting Botnets Using File System Indicators
Pax Technica
Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
Ethical Hacking
Defending Against Cybercrime: Advances in the Detection of Malicious Servers and the Analysis of Client-Side Vulnerabilities
Survey and Taxonomy of Botnet Research Through Life-Cycle
Detecting DGA Bots in a Single Network
Domain Generation Algorithm (DGA) Detection
Distributed Attacks As Security Games
Dissertation Detecting Advanced Botnets in Enterprise Networks
Book and Is Not Responsible for the Web: Content of the External Sources, Including External Websites Referenced in This Publication
From Throw-Away Traffic to Bots
Network Based Botnet Detection
Active Defense: an Overview of the Debate and a Way Forward
Unleashing a Cure for the Botnet Zombie Plague: Cybertorts, Counterstrikes, and Privileges
Dissecting the Kraken
Top View
Proactive Botnet Countermeasures – an Offensive Approache
Cloaking Malware with the Trusted Platform Module
Botnet Detection Techniques: Review, Future Trends, and Issues*
Automatic Detection of Malware-Generated Domains with Recurrent Neural Models
Analysis of a Botnet Takeover
Analysis of Malware and Domain Name System Traffic
Defenders Disrupting Adversaries: Framework, Dataset, and Case Studies of Disruptive Counter-Cyber Operations
The Next Generation Botnet Attacks and Defenses
Spectrum of Cyber Threats & Available Control Mechanisms
Proactive Botnet Countermeasures an Offensive Approach
The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers
Malicious Codes Detection in Distributed Environment Ta Thanh Dinh
Doctoral Thesis
Advances in the Detection of Malicious Servers and the Analysis of Client-Side Vulnerabilities
Using Botnet Technologies to Counteract Network Traffic Analysis Yu Fu Clemson University,
[email protected]
Chapter 1 Introduction: Botnets in Context 12
Self-Defense and Deterrence in Cyberspace