Author:
Choi Jaehoon,Kang Jaewoo,Lee Jinseung,Song Chihwan,Jin Qingsong,Lee Sunwon,Uh Jinsun
Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Computer Science Applications,Hardware and Architecture,Theoretical Computer Science,Software
Reference22 articles.
1. Ramachandran A, Feamster N. Understanding the network-level behavior of spammers. ACM SIGCOMM Computer Communication Review, 2006, 36(4): 291–302.
2. Goebel J, Holz T. Rishi: Identify bot contaminated hosts by IRC nickname evaluation. In Proc. the 1st Workshop on Hot Topics in Understanding Botnets, Apr. 2007.
3. Karasaridis A, Rexroad B, Hoeflin D. Wide-scale botnet detection and characterization. In Proc. the 1st Workshop on Hot Topics in Understanding Botnets, Apr. 2007.
4. Spitzner L. The honeynet project: Trapping the hackers. IEEE Security and Privacy, 2003, 1(2): 15–23.
5. Vrable M, Ma J, Chen J et al. Scalability, fidelity, and containment in the Potemkin virtual honeyfarm. ACM SIGOPS Operating Systems Review, 2005, 39(5): 148–162.