Author:
Yin Jie,Cui Xiang,Liu Chaoge,Liu Qixu,Cui Tao,Wang Zhi
Publisher
Springer International Publishing
Reference27 articles.
1. Bailey, M., Cooke, E., Jahanian, F., et al.: A survey of botnet technology and defenses. In: Conference for Homeland Security, CATCH 2009. Cybersecurity Applications & Technology, pp. 299–304. IEEE (2009)
2. Wang, P., Aslam, B., Zou, C.: Peer-to-peer botnets. In: Stavroulakis, P., Stamp, M. (eds.) Handbook of Information and Communication Security, pp. 335–350. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-04117-4_18
3. Trend Micro Cyber Safety Solutions Team. Glupteba Campaign Hits Network Routers and Updates C&C Servers with Data from Bitcoin Transactions. [EB/OL] (2019). https://blog.trendmicro.com/trendlabs-security-intelligence/glupteba-campaign-hits-network-routers-and-updates-cc-servers-with-data-from-bitcoin-transactions/
4. Lecture Notes in Computer Science;ST Ali,2015
5. Sweeny, J.: Botnet Resiliency via Private Blockchains, from the SANS Institute Reading Room (2017). https://www.sans.org/reading-room/whitepapers/covert/paper/38050
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献