-
2
-
-
84888402098
-
The Zombie roundup: Understanding, detecting, and disrupting botnets
-
Evan Cooke, Farnam Jahanian, Danny McPherson, The Zombie roundup: understanding, detecting, and disrupting botnets, Proceedings of the Steps to Reducing Unwanted Traffic on the Internet Workshop, pp. 39-44, 2005.
-
(2005)
Proceedings of the Steps to Reducing Unwanted Traffic on the Internet Workshop
, pp. 39-44
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
3
-
-
44649101679
-
-
Dept. of Computer Science, University of Calgary, TR 2006-840-33
-
Ryan Vogt and John Aycock, Attack of the 50 Foot Botnet, Dept. of Computer Science, University of Calgary, TR 2006-840-33, 2006.
-
(2006)
Attack of the 50 Foot Botnet
-
-
Vogt, R.1
Aycock, J.2
-
5
-
-
48649089769
-
A taxonomy of botnet structures
-
D. Dagon, G. Gu, C. Lee, and W. Lee, A taxonomy of botnet structures, In Proceedings of the 23 Annual Computer Security Applications Conference (ACSAC'07), 2007.
-
(2007)
Proceedings of the 23 Annual Computer Security Applications Conference (ACSAC'07)
-
-
Dagon, D.1
Gu, G.2
Lee, C.3
Lee, W.4
-
6
-
-
66249147541
-
A survey of botnet technology and defenses
-
M. Bailey, E. Cooke, F. Jahanian, Y. Xu and M. Karir, A Survey of Botnet Technology and Defenses, In Proceedings of Cybersecurity Applications & Technology Conference For Homeland Security (CATCH), pp. 299-304, 2009.
-
(2009)
Proceedings of Cybersecurity Applications & Technology Conference for Homeland Security (CATCH)
, pp. 299-304
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Xu, Y.4
Karir, M.5
-
7
-
-
11144272176
-
A taxonomy of DDoS attack and DDoS defense mechanisms
-
Jelena Mirkovic, Peter Reiher, A Taxonomy of DDoS Attack and DDoS Defense Mechanisms, ACM SIGCOMM Computer Communication Review, Vol. 34, No. 2, 2004.
-
(2004)
ACM SIGCOMM Computer Communication Review
, vol.34
, Issue.2
-
-
Mirkovic, J.1
Reiher, P.2
-
9
-
-
78651064965
-
A new bot disinfection method based on DNS sinkhole
-
Young-Baek Kirn, Heung-Youl Youm, A New Bot Disinfection Method Based on DNS Sinkhole, Journal of KIISC, Vol. 18, No. 6(A), pp. 107-114, 2008.
-
(2008)
Journal of KIISC
, vol.18
, Issue.6 A
, pp. 107-114
-
-
Kirn, Y.-B.1
Youm, H.-Y.2
-
10
-
-
78651065496
-
Preventing botnet damage technique and it's effect using bot DNS sinkhole
-
Young-Baek Kim, Dong-Ryun Lee, Joong-Sup Choi, Heung-Youl Youm, Preventing Botnet Damage Technique and It's Effect using Bot DNS Sinkhole, Journal of KISS (C): Computing Practices, Vol. 15, No. 1, pp. 47-55, 2009.
-
(2009)
Journal of KISS (C): Computing Practices
, vol.15
, Issue.1
, pp. 47-55
-
-
Kim, Y.-B.1
Lee, D.-R.2
Choi, J.-S.3
Youm, H.-Y.4
-
13
-
-
33750580814
-
IP traceback algorithm for DoS/DDoS attack
-
Management of Convergence Networks and Services - 9th Asia-Pacific Network Operations and Management Symposium, APNOMS 2006, Proceedings
-
Hong-bin Yim, Jae-il Jung, IP Traceback Algorithm for DoS? DDoS Attack, APNOMS 2006, LNCS 4238, pp. 558-561, 2006. (Pubitemid 44681336)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4238
, pp. 558-561
-
-
Yim, H.-B.1
Jung, J.-I.2
-
14
-
-
33646517023
-
Collision detection in complex dynamic scenes using an LGMD-based visual neural network with feature enhancement
-
Shigang-Yue, F. C.-Rind, Collision detection in complex dynamic scenes using an LGMD-based visual neural network with feature enhancement, IEEE Trans on Neural Networks, Vol. 17, No. 3, 2006.
-
(2006)
IEEE Trans on Neural Networks
, vol.17
, Issue.3
-
-
Shigang-Yue, F.1
Rind, C.2
-
15
-
-
56649098628
-
My botnet is bigger than yours (maybe, better than yours)
-
M. A. Rajab, J. Zarfoss, F. Monrose, A. Terzis, My botnet is bigger than yours (maybe, better than yours), In Proceedings of HotBots'07, 2007.
-
(2007)
Proceedings of HotBots'07
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
16
-
-
84860170510
-
-
TR-2007-010, December 3
-
Jianwei Zhuge, Thorsten Holz, Xinhui Han, Jinpeng Guo, Wei Zou, Characterizing the IRC-based Botnet Phenomenon, Reihe Informatik. TR-2007-010, December 3, 2007.
-
(2007)
Characterizing the IRC-based Botnet Phenomenon, Reihe Informatik
-
-
Zhuge, J.1
Holz, T.2
Han, X.3
Guo, J.4
Zou, W.5
-
19
-
-
34548321774
-
Detecting wormhole attacks in wireless networks using connectivity information
-
R. Maheshwari, J. Gao, S. R Das, Detecting Wormhole Attacks in Wireless Networks using Connectivity Information, In IEEE INFORCOM, 2007.
-
(2007)
IEEE INFORCOM
-
-
Maheshwari, R.1
Gao, J.2
Das, S.R.3
-
20
-
-
33947678254
-
Packet loss analysis of the IEEE 802.15.4 MAC without acknowledgements
-
Feng-Shu, Taka-Sakurai, M. Zukerman, H. L. Vu, Packet loss analysis of the IEEE 802.15.4 MAC without acknowledgements, IEEE Communications Letters, Vol. 11, No. 1, 2009.
-
(2009)
IEEE Communications Letters
, vol.11
, Issue.1
-
-
Feng-Shu, T.-S.1
Zukerman, M.2
Vu, H.L.3
|