P 2 PWNED : Modeling and Evaluating the Resilience of Peer-to-Peer Botnets
暂无分享,去创建一个
[1] R. Stephenson. A and V , 1962, The British journal of ophthalmology.
[2] Beom Jun Kim,et al. Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[3] Sven Dietrich,et al. Analysis of the Storm and Nugache Trojans: P2P Is Here , 2007, login Usenix Mag..
[4] Guofei Gu,et al. A Taxonomy of Botnet Structures , 2007, ACSAC.
[5] Felix C. Freiling,et al. Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm , 2008, LEET.
[6] Christopher Krügel,et al. Overbot: a botnet protocol based on Kademlia , 2008, SecureComm.
[7] Chris Kanich,et al. The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff , 2008, LEET.
[8] Thorsten Holz,et al. As the net churns: Fast-flux botnet observations , 2008, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE).
[9] T. Holz,et al. Towards Next-Generation Botnets , 2008, 2008 European Conference on Computer Network Defense.
[10] Yongdae Kim,et al. Towards complete node enumeration in a peer-to-peer botnet , 2009, ASIACCS '09.
[11] Christopher Krügel,et al. Your botnet is my botnet: analysis of a botnet takeover , 2009, CCS.
[12] Jian Kang,et al. Application Entropy Theory to Detect New Peer-to-Peer Botnet with Multi-chart CUSUM , 2009, 2009 Second International Symposium on Electronic Commerce and Security.
[13] Felix C. Freiling,et al. Walowdac - Analysis of a Peer-to-Peer Botnet , 2009, 2009 European Conference on Computer Network Defense.
[14] Guanhua Yan,et al. RatBot: Anti-enumeration Peer-to-Peer Botnets , 2011, ISC.
[15] Guanhua Yan,et al. AntBot: Anti-pollution peer-to-peer botnets , 2011, Comput. Networks.
[16] Michael K. Reiter,et al. Revisiting Botnet Models and Their Implications for Takedown Strategies , 2012, POST.
[17] W. Marsden. I and J , 2012 .
[18] Elmar Gerhards-Padilla,et al. Case study of the Miner Botnet , 2012, 2012 4th International Conference on Cyber Conflict (CYCON 2012).
[19] David Dittrich,et al. So You Want to Take Over a Botnet , 2012, LEET.
[20] Roberto Perdisci,et al. From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware , 2012, USENIX Security Symposium.
[21] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.