-
4
-
-
84888402098
-
The Zombie Roundup Understanding, Detecting, and Disrupting BotNets: In Steps to Reducing Unwanted Traffic on the Internet Workshop
-
SRUTI''5
-
E. Cooke, F. Jahanian, "The Zombie Roundup Understanding, Detecting, and Disrupting BotNets: In Steps to Reducing Unwanted Traffic on the Internet Workshop," SRUTI''5, 2005
-
(2005)
-
-
Cooke, E.1
Jahanian, F.2
-
5
-
-
50449106158
-
-
online Fraud: An update 2005
-
K.Legelis, "Combating online Fraud: An update 2005," http://information-integrity.com/article.cfm?articleid=100
-
Combating
-
-
Legelis, K.1
-
6
-
-
50449086208
-
Increased Activity Targetting Windows Shares
-
Aug
-
A. Householder and R. Danyliw, "Increased Activity Targetting Windows Shares," CERT Advisory CA, Aug.,2003
-
(2003)
CERT Advisory CA
-
-
Householder, A.1
Danyliw, R.2
-
7
-
-
50449104374
-
-
URL
-
URL: http://reviews.cnet.com/4520-3413_7-5021079-1.html
-
-
-
-
8
-
-
50449090811
-
-
Increased Intruder attack against Servers to expand illegal file sharing networks, Austrian CERT advisory reference - AA-2002.03 (File-Sharing Activity Part 2 of 2) -20 May 2002. URL: http:/www.auscert.org.au/ render.hitm?it=2229&cid=1.
-
"Increased Intruder attack against Servers to expand illegal file sharing networks," Austrian CERT advisory reference - AA-2002.03 (File-Sharing Activity Part 2 of 2) -20 May 2002. URL: http:/www.auscert.org.au/ render.hitm?it=2229&cid=1.
-
-
-
-
11
-
-
50449103857
-
BotNets: Detection and Mitigation
-
February
-
Jones, Jim, "BotNets: Detection and Mitigation," FEDCIRC, February 2003.
-
(2003)
FEDCIRC
-
-
Jones, J.1
-
12
-
-
50449099332
-
-
http://www.cert.org./tech_tips/home_networks.html
-
-
-
-
13
-
-
78249251033
-
Protocol-Independent Adaptive Replay of Application Dialog
-
San iego, CA, Feb
-
N. W. Weidon, C. V. Paxson, H. Randy Katz, "Protocol-Independent Adaptive Replay of Application Dialog," In Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS), San iego, CA, Feb 2006.
-
(2006)
Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS)
-
-
Weidon, N.W.1
Paxson, C.V.2
Randy Katz, H.3
-
14
-
-
33750376717
-
-
M. Vrable, J. Ma, J. Chen, D. Moore, E. Vandekieft, A. C. Snoeren, M. Geoffrey, Voelker, S. Savage, Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm, Proceedings of ACM IGOPS Operating System Review, 39(5):pp - 148-162, 2005.
-
M. Vrable, J. Ma, J. Chen, D. Moore, E. Vandekieft, A. C. Snoeren, M. Geoffrey, Voelker, S. Savage, "Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm," Proceedings of ACM IGOPS Operating System Review, Vol. 39(5):pp - 148-162, 2005.
-
-
-
-
15
-
-
50449103999
-
-
D. Whute. E. Karanakis, P. Van Oorschot, DNS-based Detection of Scanning Worms in an Enterprise Network, Proeedings. Of the 12th Annual Network and Distributed System Security Symposium, USA. Feb 3-4, 2005.
-
D. Whute. E. Karanakis, P. Van Oorschot, "DNS-based Detection of Scanning Worms in an Enterprise Network," Proeedings. Of the 12th Annual Network and Distributed System Security Symposium, USA. Feb 3-4, 2005.
-
-
-
-
17
-
-
47649088544
-
Ramifications of Cyber Crime and Suggestive Preventive Measures
-
Chicago, U.S.A, May
-
J. Govil and J. Govil, "Ramifications of Cyber Crime and Suggestive Preventive Measures", IEEE Electro/Information Technology Conference, Chicago, U.S.A., May 2007.
-
(2007)
IEEE Electro/Information Technology Conference
-
-
Govil, J.1
Govil, J.2
-
18
-
-
50449083185
-
-
URL
-
Symantec Security Check, URL: http://security.symantec.com/sscv6/home. asp?j=1&langid=ie&venid=sym*plfid=23&pkj=BINJESLHFEPGEVVSDUX.
-
Symantec Security Check
-
-
-
19
-
-
50449094822
-
-
J. Carpenter, C. Dougherty, S. Hernan, Continuing Threats to Home Users CERT® Advisory CA-2001-20.
-
J. Carpenter, C. Dougherty, S. Hernan, "Continuing Threats to Home Users" CERT® Advisory CA-2001-20.
-
-
-
|