Criminology of BotNets and their detection and defense methods
暂无分享,去创建一个
[1] Mostafa H. Ammar,et al. Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme , 2004, Comput. Networks.
[2] Farnam Jahanian,et al. The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets , 2005, SRUTI.
[3] Michael D. Smith,et al. Access for sale: a new class of worm , 2003, WORM '03.
[4] Brian Neil Levine,et al. Responder anonymity and anonymous peer-to-peer file sharing , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[5] Nicolas Ianelli,et al. Botnets as a Vehicle for Online Crime , 2007 .
[6] Aaron Hackworth,et al. Botnets as a Vehicle for Online Crimes , 2006 .
[7] Mostafa Ammar,et al. Prefix-preserving IP address anonymization , 2004 .
[8] Felix C. Freiling,et al. The Nepenthes Platform: An Efficient Approach to Collect Malware , 2006, RAID.
[9] Christophe Kalt,et al. Internet Relay Chat: Client Protocol , 2000, RFC.