-
1
-
-
74549154836
-
-
S. Berinato, How a bookmaker and a whiz kid took on a DDOS-based online extortion attack, May 2005. [Online]. Available: http://www.csoonline.com/article/220336/How-a-Bookmaker-and-a-Whiz-Kid-Took-On- a-DDOS-based-Online-Extortion-Attack
-
S. Berinato, "How a bookmaker and a whiz kid took on a DDOS-based online extortion attack," May 2005. [Online]. Available: http://www.csoonline.com/article/220336/How-a-Bookmaker-and-a-Whiz-Kid-Took-On- a-DDOS-based-Online-Extortion-Attack
-
-
-
-
2
-
-
79954733367
-
BotGraph: Large scale spamming botnet detection
-
Boston, MA
-
Y. Zhao, Y. Xie, F. Yu, Q. Ke, Y. Yu, Y. Chen, and E. Gillum, "BotGraph: large scale spamming botnet detection," in Proc. of the USENIX Symposium on Networked Systems Design and Implementation, Boston, MA, 2009.
-
(2009)
Proc. of the USENIX Symposium on Networked Systems Design and Implementation
-
-
Zhao, Y.1
Xie, Y.2
Yu, F.3
Ke, Q.4
Yu, Y.5
Chen, Y.6
Gillum, E.7
-
3
-
-
34547453122
-
Understanding churn in peer-to-peer networks
-
Rio de Janeriro, Brazil
-
D. Stutzbach and R. Rejaie, "Understanding churn in peer-to-peer networks," in Proc. of the ACM SIGCOMM Conference on Internet Measurement, Rio de Janeriro, Brazil, 2006, pp. 189-202.
-
(2006)
Proc. of the ACM SIGCOMM Conference on Internet Measurement
, pp. 189-202
-
-
Stutzbach, D.1
Rejaie, R.2
-
4
-
-
0037984544
-
-
IETF, RFC 3261
-
J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, and E. Schooler, SIP: Session Initiation Protocol. IETF, RFC 3261.
-
SIP: Session Initiation Protocol
-
-
Rosenberg, J.1
Schulzrinne, H.2
Camarillo, G.3
Johnston, A.4
Peterson, J.5
Sparks, R.6
Handley, M.7
Schooler, E.8
-
6
-
-
74549183047
-
Der Storm-Worm,
-
Master's thesis, University of Mannheim, Mar
-
F. Dahl, "Der Storm-Worm," Master's thesis, University of Mannheim, Mar. 2008.
-
(2008)
-
-
Dahl, F.1
-
7
-
-
84947235017
-
Kademlia: A Peer-to-Peer information system based on the XOR metric
-
Cambridge, MA: Springer-Verlag
-
P. Maymounkov and D. Mazires, "Kademlia: A Peer-to-Peer information system based on the XOR metric," in Proc. of the International Workshop on Peer-to-Peer Systems. Cambridge, MA: Springer-Verlag, 2002, pp. 53-65.
-
(2002)
Proc. of the International Workshop on Peer-to-Peer Systems
, pp. 53-65
-
-
Maymounkov, P.1
Mazires, D.2
-
8
-
-
77950176513
-
-
Online, Available
-
"KadC - P2P library." [Online]. Available: http://kadc. sourceforge.net
-
KadC - P2P library
-
-
-
10
-
-
15744365814
-
-
IETF, RFC 3428
-
B. Campbell, J. Rosenberg, H. Schulzrinne, C. Huitema, and D. Gurle, Session Initiation Protocol (SIP) Extension for Instant Messaging. IETF, RFC 3428.
-
Session Initiation Protocol (SIP) Extension for Instant Messaging
-
-
Campbell, B.1
Rosenberg, J.2
Schulzrinne, H.3
Huitema, C.4
Gurle, D.5
-
12
-
-
26444485630
-
Drop call probability in established cellular networks: From data analysis to modelling
-
Stockholm, Sweden
-
G. Boggia, P. Camarda, A. D'Alconzo, A. D. Biasi, and M. Siviero, "Drop call probability in established cellular networks: from data analysis to modelling," in Proc. of the Vehicular Technology Conference, vol. 5, Stockholm, Sweden, 2005, pp. 2775-2779.
-
(2005)
Proc. of the Vehicular Technology Conference
, vol.5
, pp. 2775-2779
-
-
Boggia, G.1
Camarda, P.2
D'Alconzo, A.3
Biasi, A.D.4
Siviero, M.5
-
13
-
-
84882753373
-
Botnet Detection Based on Network Behavior, ser. Advances in Information Security
-
W. Strayer, D. Lapsely, R. Walsh, and C. Livadas, Botnet Detection Based on Network Behavior, ser. Advances in Information Security. Springer-Verlag, 2008, vol. 36, pp. 1-24.
-
(2008)
Springer-Verlag
, vol.36
, pp. 1-24
-
-
Strayer, W.1
Lapsely, D.2
Walsh, R.3
Livadas, C.4
-
14
-
-
85075837457
-
BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection
-
San Jose, CA
-
G. Gu, R. Perdisci, J. Zhang, and W. Lee, "BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection," in Proc. of the USENIX Security Symposium, San Jose, CA, 2008, pp. 139-154.
-
(2008)
Proc. of the USENIX Security Symposium
, pp. 139-154
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
15
-
-
85175133385
-
BotSniffer: Detecting botnet command and control channels in network traffic
-
San Diego, CA
-
G. Gu, J. Zhang, and W. Lee, "BotSniffer: detecting botnet command and control channels in network traffic," in Proc. of the Network & Distributed System Security Symposium, San Diego, CA, 2008.
-
(2008)
Proc. of the Network & Distributed System Security Symposium
-
-
Gu, G.1
Zhang, J.2
Lee, W.3
-
16
-
-
84891429894
-
Modeling botnet propagation using time zones
-
San Diego, CA
-
D. Dagon, C. Zou, and W. Lee, "Modeling botnet propagation using time zones," in Proc. of the Network and Distributed System Security Symposium, San Diego, CA, 2006.
-
(2006)
Proc. of the Network and Distributed System Security Symposium
-
-
Dagon, D.1
Zou, C.2
Lee, W.3
-
17
-
-
85084097128
-
Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm
-
San Francisco, California
-
T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling, "Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm," in Proc. of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats, San Francisco, California, 2008, pp. 1-9.
-
(2008)
Proc. of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats
, pp. 1-9
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.4
Freiling, F.5
|