Army of Botnets
暂无分享,去创建一个
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Algirdas Avizienis,et al. The N-Version Approach to Fault-Tolerant Software , 1985, IEEE Transactions on Software Engineering.
[3] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[4] Jose Nazario,et al. The Future of Internet Worms , 2001 .
[5] Peter Szor,et al. HUNTING FOR METAMORPHIC , 2001 .
[6] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[7] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[8] Vern Paxson,et al. The top speed of flash worms , 2004, WORM '04.
[9] Massimo Marchiori,et al. Error and attacktolerance of complex network s , 2004 .
[10] John Canavan,et al. The evolution of malicious IRC bots , 2005 .
[11] Stefan Savage,et al. Self-stopping worms , 2005, WORM '05.
[12] Chuanyi Ji,et al. A self-learning worm using importance scanning , 2005, WORM '05.
[13] Farnam Jahanian,et al. The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets , 2005, SRUTI.
[14] Andreas Terzis,et al. On the impact of dynamic addressing on malware propagation , 2006, WORM '06.
[15] Richard J. Lipton,et al. A Taxonomy of Botnets , 2006 .
[16] Andreas Terzis,et al. A multifaceted approach to understanding the botnet phenomenon , 2006, IMC '06.
[17] Nicolas Ianelli,et al. Botnets as a Vehicle for Online Crime , 2007 .