Author:
Lin Hui-Tang,Lin Ying-You,Chiang Jui-Wei
Subject
Computer Networks and Communications
Reference31 articles.
1. Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, Giovanni Vigna, Your botnet is my botnet: analysis of a botnet takeover, in: Proceedings of the 16th ACM conference on Computer and communications security, 2009.
2. Learning more about the underground economy: a case-study of keyloggers and dropzones;Holz;Lecture Notes in Computer Science,2009
3. Stefan Saroiu, Steven D. Gribble, Henry M. Levy, Measurement and analysis of spyware in a university environment, in: Proceedings of 1st conference on symposium on networked systems design and implementation, 2004.
4. Anirudh Ramachandran, Nick Feamster, “Understanding the network-level behavior of spammers,” in: Proceedings of the conference on applications, technologies, architectures, and protocols for computer communications, 2006.
5. Evan Cooke, Farnam Jahanian, The zombie roundup: Understanding, detecting, and disrupting botnets, in: Steps to reducing unwanted traffic on the internet workshop, 2005.
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献