Towards social botnet behavior detecting in the end host
暂无分享,去创建一个
[1] Guofei Gu,et al. NEIGHBORWATCHER: A Content-Agnostic Comment Spam Inference System , 2013, NDSS.
[2] Nikolaus Augsten,et al. RTED: A Robust Algorithm for the Tree Edit Distance , 2011, Proc. VLDB Endow..
[3] Qiang Li,et al. A Mulitiprocess Mechanism of Evading Behavior-Based Bot Detection Approaches , 2014, ISPEC.
[4] Paulo Salvador,et al. Detecting Social-Network Bots Based on Multiscale Behavioral Analysis , 2013, SECURWARE 2013.
[5] Sushil Jajodia,et al. Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg? , 2012, IEEE Transactions on Dependable and Secure Computing.
[6] Henk J. Sips,et al. Detection of Covert Botnet Command and Control Channels by Causal Analysis of Traffic Flows , 2013, CSS.
[7] V. Natarajan,et al. Detection of StegoBot: a covert social network botnet , 2012, SecurIT '12.
[8] Markus Kammerstetter,et al. Vanity, cracks and malware: insights into the anti-copy protection ecosystem , 2012, CCS '12.
[9] Erdong Chen,et al. Facebook immune system , 2011, SNS '11.
[10] Henk J. Sips,et al. Towards Detection of Botnet Communication through Social Media by Monitoring User Activity , 2011, ICISS.
[11] Kang G. Shin,et al. On detection of current and next-generation botnets , 2012 .
[12] Songqing Chen,et al. Spammer Behavior Analysis and Detection in User Generated Content on Social Networks , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.
[13] Xiao Wang,et al. VoteTrust: Leveraging friend invitation graph to defend against social network Sybils , 2013, 2013 Proceedings IEEE INFOCOM.
[14] Xiao Wang,et al. VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils , 2016, IEEE Transactions on Dependable and Secure Computing.
[15] Nikita Borisov,et al. Stegobot: A Covert Social Network Botnet , 2011, Information Hiding.
[16] Shouhuai Xu,et al. Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures , 2010, ACNS.
[17] Erik D. Demaine,et al. An Optimal Decomposition Algorithm for Tree Edit Distance , 2007, ICALP.
[18] Konstantin Beznosov,et al. Design and analysis of a social botnet , 2013, Comput. Networks.
[19] Mark Stamp,et al. Social Networking for Botnet Command and Control , 2013 .
[20] Ronaldo M. Salles,et al. Botnets: A survey , 2013, Comput. Networks.