Search Results

There are 18023 results for: content related to: A graph-theoretic framework for isolating botnets in a network

  1. BotCatch: leveraging signature and behavior for bot detection

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 952–969, Yuede Ji, Qiang Li, Yukun He and Dong Guo

    Version of Record online : 3 JUL 2014, DOI: 10.1002/sec.1052

  2. Detection of botnets before activation: an enhanced honeypot system for intentional infection and behavioral observation of malware

    Security and Communication Networks

    Volume 5, Issue 10, October 2012, Pages: 1094–1101, Young Hoon Moon, Eunjin Kim, Suh Mahn Hur and Huy Kang Kim

    Version of Record online : 6 FEB 2012, DOI: 10.1002/sec.431

  3. Understanding a prospective approach to designing malicious social bots

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 2157–2172, Yukun He, Guangyan Zhang, Jie Wu and Qiang Li

    Version of Record online : 24 FEB 2016, DOI: 10.1002/sec.1475

  4. Bot detection evasion: a case study on local-host alert correlation bot detection methods

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1277–1295, Brandon Shirley, Lokesh Babu and Chad Mano

    Version of Record online : 26 JAN 2012, DOI: 10.1002/sec.401

  5. Modelling influence of Botnet features on effectiveness of DDoS attacks

    Security and Communication Networks

    Volume 8, Issue 12, August 2015, Pages: 2090–2101, Simona Ramanauskaitė, Nikolaj Goranin, Antanas Čenys and Jonas Juknius

    Version of Record online : 30 OCT 2014, DOI: 10.1002/sec.1156

  6. Survey on network-based botnet detection methods

    Security and Communication Networks

    Volume 7, Issue 5, May 2014, Pages: 878–903, Sebastián García, Alejandro Zunino and Marcelo Campo

    Version of Record online : 21 JUN 2013, DOI: 10.1002/sec.800

  7. Fighting botnets with economic uncertainty

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1104–1113, Zhen Li, Qi Liao, Andrew Blaich and Aaron Striegel

    Version of Record online : 15 JUL 2010, DOI: 10.1002/sec.235

  8. Secure and transparent network traffic replay, redirect, and relay in a dynamic malware analysis environment

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 626–640, Ying-Dar Lin, Tzung-Bi Shih, Yu-Sung Wu and Yuan-Cheng Lai

    Version of Record online : 21 MAR 2013, DOI: 10.1002/sec.764

  9. Botnet spoofing: fighting botnet with itself

    Security and Communication Networks

    Volume 8, Issue 1, 10 January 2015, Pages: 80–89, Cui Xiang, Yin Lihua, Jin Shuyuan, Hao Zhiyu and Li Shuhao

    Version of Record online : 19 FEB 2013, DOI: 10.1002/sec.749

  10. Dynamic game model of botnet DDoS attack and defense

    Security and Communication Networks

    Yichuan Wang, Jianfeng Ma, Liumei Zhang, Wenjiang Ji, Di Lu and Xinhong Hei

    Version of Record online : 21 JUL 2016, DOI: 10.1002/sec.1518

  11. Spammers operations: a multifaceted strategic analysis

    Security and Communication Networks

    Volume 9, Issue 4, 10 March 2016, Pages: 336–356, O. Thonnard, Pierre-Antoine Vervier and M. Dacier

    Version of Record online : 9 OCT 2012, DOI: 10.1002/sec.640

  12. An 802.11 MAC layer covert channel

    Wireless Communications and Mobile Computing

    Volume 12, Issue 5, 10 April 2012, Pages: 393–405, Telvis E. Calhoun Jr, Xiaojun Cao, Yingshu Li and Raheem Beyah

    Version of Record online : 7 MAY 2010, DOI: 10.1002/wcm.969

  13. Could firewall rules be public – a game theoretical perspective

    Security and Communication Networks

    Volume 5, Issue 2, February 2012, Pages: 197–210, Qi Liao, Zhen Li and Aaron Striegel

    Version of Record online : 24 JAN 2011, DOI: 10.1002/sec.307

  14. Statistical learning methods for information security: fundamentals and case studies

    Applied Stochastic Models in Business and Industry

    Volume 31, Issue 2, March/April 2015, Pages: 97–113, H.-K. Pao, Y.-J. Lee and C.-Y. Huang

    Version of Record online : 6 AUG 2014, DOI: 10.1002/asmb.2052

  15. Behavior-based botnet detection in parallel

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1849–1859, Kuochen Wang, Chun-Ying Huang, Li-Yang Tsai and Ying-Dar Lin

    Version of Record online : 10 DEC 2013, DOI: 10.1002/sec.898

  16. Detecting domain-flux botnet based on DNS traffic features in managed network

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2338–2347, Dinh-Tu Truong and Guang Cheng

    Version of Record online : 17 MAY 2016, DOI: 10.1002/sec.1495

  17. Adaptive pattern mining model for early detection of botnet-propagation scale

    Security and Communication Networks

    Volume 5, Issue 8, August 2012, Pages: 917–927, Do Hoon Kim, Taek Lee, Jaewoo Kang, Hyunchoel Jeong and Hoh Peter In

    Version of Record online : 6 OCT 2011, DOI: 10.1002/sec.366

  18. Agent-based simulation of cooperative defence against botnets

    Concurrency and Computation: Practice and Experience

    Volume 24, Issue 6, 25 April 2012, Pages: 573–588, Igor Kotenko, Alexey Konovalov and Andrey Shorov

    Version of Record online : 22 SEP 2011, DOI: 10.1002/cpe.1858

  19. Characterizing flash events and distributed denial-of-service attacks: an empirical investigation

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 2222–2239, Abhinav Bhandari, Amrit Lal Sangal and Krishan Kumar

    Version of Record online : 6 MAR 2016, DOI: 10.1002/sec.1472

  20. Blind detection of spread spectrum flow watermarks

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 257–274, Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan and Wei Yu

    Version of Record online : 17 MAY 2012, DOI: 10.1002/sec.540