暂无分享,去创建一个
[1] Vishal Goar,et al. Tools, Techniques & Analysis of Botnet , 2014, ICTCS '14.
[2] Konstantin Beznosov,et al. Design and analysis of a social botnet , 2013, Comput. Networks.
[3] Gianluca Stringhini,et al. The harvester, the botmaster, and the spammer: on the relations between the different actors in the spam landscape , 2014, AsiaCCS.
[4] Steve Gold,et al. Taking down botnets , 2011, Netw. Secur..
[5] Guevara Noubir,et al. OnionBots: Subverting Privacy Infrastructure for Cyber Attacks , 2015, 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
[6] Richard J. Enbody,et al. Dissecting SpyEye - Understanding the design of third generation botnets , 2013, Comput. Networks.
[7] Ke Li,et al. POSTER: A Lightweight Unknown HTTP Botnets Detecting and Characterizing System , 2014, CCS.
[8] Farnam Jahanian,et al. A Survey of Botnet Technology and Defenses , 2009, 2009 Cybersecurity Applications & Technology Conference for Homeland Security.
[9] Uyen Trang Nguyen,et al. Socellbot: A new botnet design to infect smartphones via online social networking , 2012, 2012 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).
[10] Jungmin So,et al. On botnets , 2010, iiWAS.
[11] Maciá-FernándezGabriel,et al. Survey and taxonomy of botnet research through life-cycle , 2013 .
[12] Gabriel Maciá-Fernández,et al. Survey and taxonomy of botnet research through life-cycle , 2013, CSUR.
[13] Stefan Savage,et al. Botcoin: Monetizing Stolen Cycles , 2014, NDSS.
[14] 田端 利宏,et al. Network and Distributed System Security Symposiumにおける研究動向の調査 , 2004 .
[15] Grzegorz Landecki. Detecting botnets , 2009 .
[16] Ali A. Ghorbani,et al. Botnet detection based on traffic behavior analysis and flow intervals , 2013, Comput. Secur..
[17] Chung-Nan Lee,et al. Automatically Generating Payload-Based Models for Botnet Detection , 2015, 2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity).
[18] Ronaldo M. Salles,et al. Botnets: A survey , 2013, Comput. Networks.