Botnets IRC et P2P pour une supervision à large échelle
暂无分享,去创建一个
[1] Craig A. Schiller,et al. Botnets: The Killer Web Applications , 2007 .
[2] Laurianne McLaughlin,et al. Bot software spreads, causes new worries , 2004, IEEE Distributed Systems Online.
[3] Peter Szor,et al. The Art of Computer Virus Research and Defense , 2005 .
[4] Rolf Stadler,et al. A navigation pattern for scalable Internet management , 2001, 2001 IEEE/IFIP International Symposium on Integrated Network Management Proceedings. Integrated Network Management VII. Integrated Management Strategies for the New Millennium (Cat. No.01EX470).
[5] Brent Byunghoon Kang,et al. Peer-to-Peer Botnets: Overview and Case Study , 2007, HotBots.
[6] Radu State,et al. Probabilistic Management of Ad-Hoc Networks , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.
[7] David R. Karger,et al. Wide-area cooperative storage with CFS , 2001, SOSP.
[8] Larry L. Peterson,et al. The design principles of PlanetLab , 2006, OPSR.
[9] Rolf Stadler,et al. Real-time views of network traffic using decentralized management , 2005, 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, 2005. IM 2005..
[10] Vinod Yegneswaran,et al. An Inside Look at Botnets , 2007, Malware Detection.
[11] R. State,et al. A Management Platform for Tracking Cyber Predators in Peer-to-Peer Networks , 2007, Second International Conference on Internet Monitoring and Protection (ICIMP 2007).
[12] Denyse Baillargeon,et al. Bibliographie , 1929 .
[13] Radu State,et al. Malware: a future framework for device, network and service management , 2007, Journal in Computer Virology.
[14] Seif Haridi,et al. Efficient Broadcast in Structured P2P Networks , 2003, IPTPS.
[15] Niels Provos,et al. A Virtual Honeypot Framework , 2004, USENIX Security Symposium.
[16] Iván Arce,et al. An Analysis of the Slapper Worm , 2003, IEEE Secur. Priv..
[17] Yechiam Yemini,et al. Distributed management by delegation , 1995, Proceedings of 15th International Conference on Distributed Computing Systems.
[18] Craig Partridge,et al. Smart packets: applying active networks to network management , 2000, TOCS.
[19] Antonio F. Gómez-Skarmeta,et al. DECA: A Hierarchical Framework for DECentralized Aggregation in DHTs , 2006, DSOM.
[20] Biplab Sikdar,et al. Modeling malware propagation in Gnutella type peer-to-peer networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.
[21] Raouf Boutaba,et al. Distributed pattern matching: a key to flexible and efficient P2P search , 2007, IEEE Journal on Selected Areas in Communications.
[22] Ping Wang,et al. An Advanced Hybrid Peer-to-Peer Botnet , 2007, IEEE Transactions on Dependable and Secure Computing.
[23] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.