Search Results

There are 13683 results for: content related to: Space-efficient tracking of persistent items in a massive data stream

  1. A graph-theoretic framework for isolating botnets in a network

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2605–2623, Padmini Jaikumar and Avinash C. Kak

    Version of Record online : 28 FEB 2012, DOI: 10.1002/sec.500

  2. Bot detection evasion: a case study on local-host alert correlation bot detection methods

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1277–1295, Brandon Shirley, Lokesh Babu and Chad Mano

    Version of Record online : 26 JAN 2012, DOI: 10.1002/sec.401

  3. Modelling influence of Botnet features on effectiveness of DDoS attacks

    Security and Communication Networks

    Volume 8, Issue 12, August 2015, Pages: 2090–2101, Simona Ramanauskaitė, Nikolaj Goranin, Antanas Čenys and Jonas Juknius

    Version of Record online : 30 OCT 2014, DOI: 10.1002/sec.1156

  4. You have free access to this content
    Survey on network-based botnet detection methods

    Security and Communication Networks

    Volume 7, Issue 5, May 2014, Pages: 878–903, Sebastián García, Alejandro Zunino and Marcelo Campo

    Version of Record online : 21 JUN 2013, DOI: 10.1002/sec.800

  5. Agent-based simulation of cooperative defence against botnets

    Concurrency and Computation: Practice and Experience

    Volume 24, Issue 6, 25 April 2012, Pages: 573–588, Igor Kotenko, Alexey Konovalov and Andrey Shorov

    Version of Record online : 22 SEP 2011, DOI: 10.1002/cpe.1858

  6. Botnet spoofing: fighting botnet with itself

    Security and Communication Networks

    Volume 8, Issue 1, 10 January 2015, Pages: 80–89, Cui Xiang, Yin Lihua, Jin Shuyuan, Hao Zhiyu and Li Shuhao

    Version of Record online : 19 FEB 2013, DOI: 10.1002/sec.749

  7. Fighting botnets with economic uncertainty

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1104–1113, Zhen Li, Qi Liao, Andrew Blaich and Aaron Striegel

    Version of Record online : 15 JUL 2010, DOI: 10.1002/sec.235

  8. Adaptive pattern mining model for early detection of botnet-propagation scale

    Security and Communication Networks

    Volume 5, Issue 8, August 2012, Pages: 917–927, Do Hoon Kim, Taek Lee, Jaewoo Kang, Hyunchoel Jeong and Hoh Peter In

    Version of Record online : 6 OCT 2011, DOI: 10.1002/sec.366

  9. Detection of botnets before activation: an enhanced honeypot system for intentional infection and behavioral observation of malware

    Security and Communication Networks

    Volume 5, Issue 10, October 2012, Pages: 1094–1101, Young Hoon Moon, Eunjin Kim, Suh Mahn Hur and Huy Kang Kim

    Version of Record online : 6 FEB 2012, DOI: 10.1002/sec.431

  10. Internet Security and Networked Governance in International Relations

    International Studies Review

    Volume 15, Issue 1, March 2013, Pages: 86–104, Milton Mueller, Andreas Schmidt and Brenden Kuerbis

    Version of Record online : 10 APR 2013, DOI: 10.1111/misr.12024

  11. Understanding a prospective approach to designing malicious social bots

    Security and Communication Networks

    Yukun He, Guangyan Zhang, Jie Wu and Qiang Li

    Version of Record online : 24 FEB 2016, DOI: 10.1002/sec.1475

  12. Agent-based modeling of malware dynamics in heterogeneous environments

    Security and Communication Networks

    Volume 6, Issue 12, December 2013, Pages: 1576–1589, Abhijit Bose and Kang G. Shin

    Version of Record online : 25 FEB 2011, DOI: 10.1002/sec.298

  13. Spammers operations: a multifaceted strategic analysis

    Security and Communication Networks

    Volume 9, Issue 4, 10 March 2016, Pages: 336–356, O. Thonnard, Pierre-Antoine Vervier and M. Dacier

    Version of Record online : 9 OCT 2012, DOI: 10.1002/sec.640

  14. An 802.11 MAC layer covert channel

    Wireless Communications and Mobile Computing

    Volume 12, Issue 5, 10 April 2012, Pages: 393–405, Telvis E. Calhoun Jr, Xiaojun Cao, Yingshu Li and Raheem Beyah

    Version of Record online : 7 MAY 2010, DOI: 10.1002/wcm.969

  15. BotCatch: leveraging signature and behavior for bot detection

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 952–969, Yuede Ji, Qiang Li, Yukun He and Dong Guo

    Version of Record online : 3 JUL 2014, DOI: 10.1002/sec.1052

  16. Statistical learning methods for information security: fundamentals and case studies

    Applied Stochastic Models in Business and Industry

    Volume 31, Issue 2, March/April 2015, Pages: 97–113, H.-K. Pao, Y.-J. Lee and C.-Y. Huang

    Version of Record online : 6 AUG 2014, DOI: 10.1002/asmb.2052

  17. Behavior-based botnet detection in parallel

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1849–1859, Kuochen Wang, Chun-Ying Huang, Li-Yang Tsai and Ying-Dar Lin

    Version of Record online : 10 DEC 2013, DOI: 10.1002/sec.898

  18. Detecting domain-flux botnet based on DNS traffic features in managed network

    Security and Communication Networks

    Dinh-Tu Truong and Guang Cheng

    Version of Record online : 17 MAY 2016, DOI: 10.1002/sec.1495

  19. The new threat to internet: DNP attack with the attacking flows strategizing technology

    International Journal of Communication Systems

    Volume 28, Issue 6, April 2015, Pages: 1126–1139, Heshuai Li, Junhu Zhu, Han Qiu, Qingxian Wang, Tianyang Zhou and Hang Li

    Version of Record online : 4 FEB 2014, DOI: 10.1002/dac.2748

  20. Similarity as a central approach to flow-based anomaly detection

    International Journal of Network Management

    Volume 24, Issue 4, July/August 2014, Pages: 318–336, Martin Drašar, Martin Vizváry and Jan Vykopal

    Version of Record online : 23 JUN 2014, DOI: 10.1002/nem.1867