-
1
-
-
78649316131
-
Modeling and analyzing of botnet interactions
-
2-s2.0-78649316131 10.1016/j.physa.2010.10.001
-
Song L. P., Jin Z., Sun G. Q., Modeling and analyzing of botnet interactions. Physica A 2011 390 2 347 358 2-s2.0-78649316131 10.1016/j.physa.2010.10.001
-
(2011)
Physica A
, vol.390
, Issue.2
, pp. 347-358
-
-
Song, L.P.1
Jin, Z.2
Sun, G.Q.3
-
2
-
-
84870034508
-
The research on approaches for botnet detection
-
10.1016/j.egypro.2011.12.792
-
Zhang W. F., Jin C., The research on approaches for botnet detection. Energy Procedia 2011 13 9726 9732 10.1016/j.egypro.2011.12.792
-
(2011)
Energy Procedia
, vol.13
, pp. 9726-9732
-
-
Zhang, W.F.1
Jin, C.2
-
4
-
-
71649087916
-
On the detection and identification of botnets
-
2-s2.0-71649087916 10.1016/j.cose.2009.07.007
-
Seewald A. K., Gansterer W. N., On the detection and identification of botnets. Computers and Security 2010 29 1 45 58 2-s2.0-71649087916 10.1016/j.cose.2009.07.007
-
(2010)
Computers and Security
, vol.29
, Issue.1
, pp. 45-58
-
-
Seewald, A.K.1
Gansterer, W.N.2
-
5
-
-
79952572775
-
Botnets: To what extent are they a threat to information security?
-
2-s2.0-79952572775 10.1016/j.istr.2010.11.003
-
Elliott C., Botnets: to what extent are they a threat to information security? Information Security Technical Report 2010 15 3 79 103 2-s2.0-79952572775 10.1016/j.istr.2010.11.003
-
(2010)
Information Security Technical Report
, vol.15
, Issue.3
, pp. 79-103
-
-
Elliott, C.1
-
6
-
-
78751649445
-
Clustering botnet communication traffic based on n-gram feature selection
-
2-s2.0-78751649445 10.1016/j.comcom.2010.04.007
-
Lu W., Rammidi G., Ghorbani A. A., Clustering botnet communication traffic based on n-gram feature selection. Computer Communications 2011 34 3 502 514 2-s2.0-78751649445 10.1016/j.comcom.2010.04.007
-
(2011)
Computer Communications
, vol.34
, Issue.3
, pp. 502-514
-
-
Lu, W.1
Rammidi, G.2
Ghorbani, A.A.3
-
7
-
-
80955158545
-
Estimating botnet virulence within mathematical models of botnet propagation dynamics
-
10.1016/j.cose.2011.07.004
-
Rrushi J., Mokhtari E., Ghorbani A. A., Estimating botnet virulence within mathematical models of botnet propagation dynamics. Computer & Security 2011 30 791 802 10.1016/j.cose.2011.07.004
-
(2011)
Computer & Security
, vol.30
, pp. 791-802
-
-
Rrushi, J.1
Mokhtari, E.2
Ghorbani, A.A.3
-
8
-
-
33746642190
-
Worms and viruses and botnets, Oh My!
-
DOI 10.1109/MSP.2006.83, 1637381
-
Schaffer G. P., Worms and viruses and botnets, Oh My!: rational responses to emerging internet threats. IEEE Security and Privacy 2006 4 3 52 58 10.1109/MSP.2006.83 (Pubitemid 44144078)
-
(2006)
IEEE Security and Privacy
, vol.4
, Issue.3
, pp. 52-58
-
-
Schaffer, G.P.1
-
9
-
-
0742276097
-
Inside the slammer worm
-
2-s2.0-0742276097 10.1109/MSECP.2003.1219056
-
Moore D., Paxson V., Savage S., Shannon C., Staniford S., Weaver N., Inside the slammer worm. IEEE Security and Privacy 2003 1 4 33 39 2-s2.0-0742276097 10.1109/MSECP.2003.1219056
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
10
-
-
34047099327
-
Fast-moving Zombies: Botnets stay a step ahead of the fixes
-
DOI 10.1109/MIC.2007.32
-
Goth G., Fast-moving Zombies: botnets stay a step ahead of the fixes. IEEE Internet Computing 2007 11 2 7 9 2-s2.0-34047099327 10.1109/MIC.2007.32 (Pubitemid 46511102)
-
(2007)
IEEE Internet Computing
, vol.11
, Issue.2
, pp. 7-9
-
-
Goth, G.1
-
11
-
-
84882582017
-
An inside look at botnets
-
10.1007/978-0-387-44599-18
-
Barford P., Yegneswaran V., An inside look at botnets. Malware Detection 2007 27 171 191 10.1007/978-0-387-44599-18
-
(2007)
Malware Detection
, vol.27
, pp. 171-191
-
-
Barford, P.1
Yegneswaran, V.2
-
14
-
-
85084097128
-
-
Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats 2008
-
Holz T., Steiner M., Dahl F., Biersack E., Freiling F., Measurements and mitigation of peer-to- peer-based botnets: a case study on storm eorm. Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats 2008
-
Measurements and Mitigation of Peer-to- Peer-based Botnets: A Case Study on Storm Eorm
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.4
Freiling, F.5
-
15
-
-
56649088308
-
-
Proceedings of the 5th International Conference on the Quantitative Evaluation of Systems (QEST '08) September 2008 2-s2.0-56649088308 10.1109/QEST.2008.43
-
Van Ruitenbeek E., Sanders W. H., Modeling peer-to-peer botnets. Proceedings of the 5th International Conference on the Quantitative Evaluation of Systems (QEST '08) September 2008 307 316 2-s2.0-56649088308 10.1109/QEST.2008.43
-
Modeling Peer-to-peer Botnets
, pp. 307-316
-
-
Van Ruitenbeek, E.1
Sanders, W.H.2
-
16
-
-
84856566954
-
Comparison of the mean-field approach and simulation in a peer-to-peer botnet case study
-
10.1007/978-3-642-24749-111
-
Kolesnichenko A., Remke A., Boer P. T., Haverkort B. R., Comparison of the mean-field approach and simulation in a peer-to-peer botnet case study. Computer Performance Engineering 2011 6977 133 147 10.1007/978-3-642-24749-111
-
(2011)
Computer Performance Engineering
, vol.6977
, pp. 133-147
-
-
Kolesnichenko, A.1
Remke, A.2
Boer, P.T.3
Haverkort, B.R.4
-
17
-
-
79955775981
-
AntBot: Anti-pollution peer-to-peer botnets
-
2-s2.0-79955775981 10.1016/j.comnet.2011.02.006
-
Yan G., Ha D. T., Eidenbenz S., AntBot: anti-pollution peer-to-peer botnets. Computer Networks 2011 55 8 1941 1956 2-s2.0-79955775981 10.1016/j.comnet.2011.02.006
-
(2011)
Computer Networks
, vol.55
, Issue.8
, pp. 1941-1956
-
-
Yan, G.1
Ha, D.T.2
Eidenbenz, S.3
-
18
-
-
84883853753
-
-
Orlando, Fla, USA School of Electrical Engineering and Computer Science, University of Central Florida
-
Wang P., Aslam B., Zou C. C., Peer-to-Peer Botnets: The Next Generation of Botnet Attacks 2010 Orlando, Fla, USA School of Electrical Engineering and Computer Science, University of Central Florida
-
(2010)
Peer-to-Peer Botnets: The Next Generation of Botnet Attacks
-
-
Wang, P.1
Aslam, B.2
Zou, C.C.3
-
19
-
-
80052789013
-
A novel computer virus model and its dynamics
-
10.1016/j.nonrwa.2011.07.048 2846848 ZBL1238.34076
-
Ren J. G., Yang X. F., Zhu Q. Y., Yang L. X., Zhang C. M., A novel computer virus model and its dynamics. Nonlinear Analysis: Real World Applications 2012 13 1 376 384 10.1016/j.nonrwa.2011.07.048 2846848 ZBL1238.34076
-
(2012)
Nonlinear Analysis: Real World Applications
, vol.13
, Issue.1
, pp. 376-384
-
-
Ren, J.G.1
Yang, X.F.2
Zhu, Q.Y.3
Yang, L.X.4
Zhang, C.M.5
-
20
-
-
84863325044
-
Optimal control of computer virus under a delayed model
-
10.1016/j.amc.2012.04.092 2944005
-
Zhu Q. Y., Yang X. F., Yang L. X., Zhang C. M., Optimal control of computer virus under a delayed model. Applied Mathematics and Computation 2012 218 23 11613 11619 10.1016/j.amc.2012.04.092 2944005
-
(2012)
Applied Mathematics and Computation
, vol.218
, Issue.23
, pp. 11613-11619
-
-
Zhu, Q.Y.1
Yang, X.F.2
Yang, L.X.3
Zhang, C.M.4
-
21
-
-
84861987353
-
Hopf bifurcation analysis of a delayed viral infection model in computer networks
-
10.1016/j.mcm.2011.12.010
-
Feng L. P., Liao X. F., Li H. Q., Han Q., Hopf bifurcation analysis of a delayed viral infection model in computer networks. Mathematics and Computer Modeling 2012 56 167 179 10.1016/j.mcm.2011.12.010
-
(2012)
Mathematics and Computer Modeling
, vol.56
, pp. 167-179
-
-
Feng, L.P.1
Liao, X.F.2
Li, H.Q.3
Han, Q.4
-
22
-
-
84864933804
-
Propagation behavior of virus code in the situation that infected computers are connected to the Internet with possible probability
-
693695 10.1155/2012/693695
-
Yang L. X., Yang X. F., Propagation behavior of virus code in the situation that infected computers are connected to the Internet with possible probability. Discrete Dynamics in Nature and Society 2012 2012 13 693695 10.1155/2012/693695
-
(2012)
Discrete Dynamics in Nature and Society
, vol.2012
, pp. 13
-
-
Yang, L.X.1
Yang, X.F.2
-
25
-
-
84864943499
-
Propagation of computer virus under human intervention: A dynamical model
-
106950 10.1155/2012/106950
-
Gan C. Q., Yang X. F., Liu W. P., Zhu Q. Y., Zhang X. L., Propagation of computer virus under human intervention: a dynamical model. Discrete Dynamics in Nature and Society 2012 2012 8 106950 10.1155/2012/106950
-
(2012)
Discrete Dynamics in Nature and Society
, vol.2012
, pp. 8
-
-
Gan, C.Q.1
Yang, X.F.2
Liu, W.P.3
Zhu, Q.Y.4
Zhang, X.L.5
-
26
-
-
55949131751
-
Network virus-epidemic model with the point-to-group information propagation
-
10.1016/j.amc.2008.09.025 2474981 ZBL1162.68404
-
Yuan H., Chen G. Q., Network virus-epidemic model with the point-to-group information propagation. Applied Mathematics and Computation 2008 206 1 357 367 10.1016/j.amc.2008.09.025 2474981 ZBL1162.68404
-
(2008)
Applied Mathematics and Computation
, vol.206
, Issue.1
, pp. 357-367
-
-
Yuan, H.1
Chen, G.Q.2
|