Requirements and State of the Art
Author:
Karuppayah Shankar
Publisher
Springer Singapore
Reference32 articles.
1. Andriesse, D., Rossow, C., Stone-Gross, B., Plohmann, D., Bos, H.: Highly resilient peer-to-peer botnets are here: an analysis of Gameover Zeus. In: International Conference on Malicious and Unwanted Software: “The Americas” (2013) 2. Andriesse, D., Rossow, C., Bos, H.: Reliable recon in adversarial peer-to-peer botnets. In: ACM SIGCOMM Internet Measurement Conference (IMC) (2015) 3. Böck, L., Karuppayah, S., Grube, T., Mühlhäuser, M., Fischer, M.: Hide and seek: detecting sensors in P2P botnets. In: IEEE Conference on Communications and Network Security, pp. 731–732 (2015) 4. Polska, C.E.R.T.: Zeus-P2P monitoring and analysis. Technical report, CERT Polska (2013) 5. Dagon, D., Gu, G., Lee, C.P., Lee, W.: A taxonomy of botnet structures. In: Computer Security Applications Conference (ACSAC), pp. 325–339. IEEE (2007)
|
|