Author:
Banks Greg,Fattori Aristide,Kemmerer Richard,Kruegel Christopher,Vigna Giovanni
Publisher
Springer Berlin Heidelberg
Reference18 articles.
1. Bailey, M., Cooke, E., Jahanian, F., Watson, D., Nazario, J.: The Blaster Worm: Then and Now. In: IEEE Security & Privace, pp. 26–31 (2005)
2. Cooke, E., Jahanian, F., McPherson, D.: The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets. In: Proceedings of the USENIX SRUTI Workshop, pp. 39–44 (2005)
3. The Honeynet Project: Know Your Enemy: Fast-Flux Service Networks (2007), www.honeynet.org/book/export/html/130
4. Freiling, F., Holz, T., Wicherski, G.: Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks. In: 10th European Symposium On Research In Computer Security (2005)
5. Rajab, M.A., Zarfoss, J., Monrose, F., Terzis, A.: A Multifaceted Approach to Understanding the Botnet Phenomenon. In: 6th ACM SIGCOMM Internet Measurement Conference, IMC (2006)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Review of Security Mechanisms for Multi-Agent Systems;Artificial Intelligence and Security Challenges in Emerging Networks;2019