Author:
Khosroshahy Masood,Mehmet Ali Mustafa K.,Qiu Dongyu
Subject
Computer Networks and Communications
Reference38 articles.
1. Battle of the botnets;Mansfield-Devine;Network Security,2010
2. Botwars: the fight against criminal cyber networks;Bleaken;Computer Fraud & Security,2010
3. C.J. Mielke, H. Chen, Botnets, and the cybercriminal underground, in: Proceedings of the IEEE International Conference on Intellignence & Secured Informatics ISI, 2008, pp. 206–211.
4. The application of epidemiology to computer viruses;Murray;Computers & Security,1988
5. Directed-graph epidemiological models of computer viruses;Kephart,1991
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. IoTSecSim: A framework for modelling and simulation of security in Internet of things;Computers & Security;2024-01
2. Detection DNS Tunneling Botnets;2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS);2021-09-22
3. Reconstruction of C&C channel for P2P botnet;IET Communications;2020-05
4. An Analysis of Botnet Models;Proceedings of the 2019 3rd International Conference on Compute and Data Analysis;2019-03-14
5. Security and Privacy Issues in Cloud-Based E-Government;Cloud Security;2019