Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Applied Mathematics,Artificial Intelligence,Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Information Systems
Reference20 articles.
1. Rawat RS, Pilli ES, Joshi RC (2018) Survey of peer-to-peer botnets and detection frameworks. Int J Netw Secur 20(3):547–557
2. Keim Y, Mohapatra AK (2019) Cyber threat intelligence framework using advanced malware forensics. Int J Inf Technol. https://doi.org/10.1007/s41870-019-00280-3
3. Derakhshan F, Ashrafnejad M (2020) The risk of botnets in cyber physical systems. In: Karimipour H et al (eds) Security of cyber-physical systems: vulnerability and impact. Springer International Publishing, Cham, pp 81–106
4. Spamhaus, Malware, and Labs Spamhaus Botnet Threat Report. 2019.
5. Giuliani, M., ZeroAccess—an advanced kernel mode rootkit. April 2011, Prevx Advanced Malware Research Team: http://www.prevx.com/blog/171/ZeroAccess-anadvanced-kernel-mode-rootkit.html, Accessed 20 Oct 2019.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献