Search Results

There are 44344 results for: content related to: Botnet spoofing: fighting botnet with itself

  1. You have full text access to this Open Access content
    A graph-theoretic framework for isolating botnets in a network

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2605–2623, Padmini Jaikumar and Avinash C. Kak

    Version of Record online : 28 FEB 2012, DOI: 10.1002/sec.500

  2. You have full text access to this Open Access content
    Bot detection evasion: a case study on local-host alert correlation bot detection methods

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1277–1295, Brandon Shirley, Lokesh Babu and Chad Mano

    Version of Record online : 26 JAN 2012, DOI: 10.1002/sec.401

  3. You have full text access to this Open Access content
    Survey on network-based botnet detection methods

    Security and Communication Networks

    Volume 7, Issue 5, May 2014, Pages: 878–903, Sebastián García, Alejandro Zunino and Marcelo Campo

    Version of Record online : 21 JUN 2013, DOI: 10.1002/sec.800

  4. You have full text access to this Open Access content
    Modelling influence of Botnet features on effectiveness of DDoS attacks

    Security and Communication Networks

    Volume 8, Issue 12, August 2015, Pages: 2090–2101, Simona Ramanauskaitė, Nikolaj Goranin, Antanas Čenys and Jonas Juknius

    Version of Record online : 30 OCT 2014, DOI: 10.1002/sec.1156

  5. You have full text access to this Open Access content
    Fighting botnets with economic uncertainty

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1104–1113, Zhen Li, Qi Liao, Andrew Blaich and Aaron Striegel

    Version of Record online : 15 JUL 2010, DOI: 10.1002/sec.235

  6. Botnet behaviour analysis: How would a data analytics-based system with minimum a priori information perform?

    International Journal of Network Management

    Volume 27, Issue 4, July/August 2017, Fariba Haddadi and A. Nur Zincir-Heywood

    Version of Record online : 9 MAY 2017, DOI: 10.1002/nem.1977

  7. You have full text access to this Open Access content
    A survey and taxonomy of DoS attacks in cloud computing

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3724–3751, Mohammad Masdari and Marzie Jalali

    Version of Record online : 13 JUL 2016, DOI: 10.1002/sec.1539

  8. You have full text access to this Open Access content
    Understanding a prospective approach to designing malicious social bots

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 2157–2172, Yukun He, Guangyan Zhang, Jie Wu and Qiang Li

    Version of Record online : 24 FEB 2016, DOI: 10.1002/sec.1475

  9. You have full text access to this Open Access content
    BotCatch: leveraging signature and behavior for bot detection

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 952–969, Yuede Ji, Qiang Li, Yukun He and Dong Guo

    Version of Record online : 3 JUL 2014, DOI: 10.1002/sec.1052

  10. You have full text access to this Open Access content
    Dynamic game model of botnet DDoS attack and defense

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3127–3140, Yichuan Wang, Jianfeng Ma, Liumei Zhang, Wenjiang Ji, Di Lu and Xinhong Hei

    Version of Record online : 21 JUL 2016, DOI: 10.1002/sec.1518

  11. You have full text access to this Open Access content
    Detecting domain-flux botnet based on DNS traffic features in managed network

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2338–2347, Dinh-Tu Truong and Guang Cheng

    Version of Record online : 17 MAY 2016, DOI: 10.1002/sec.1495

  12. Agent-based simulation of cooperative defence against botnets

    Concurrency and Computation: Practice and Experience

    Volume 24, Issue 6, 25 April 2012, Pages: 573–588, Igor Kotenko, Alexey Konovalov and Andrey Shorov

    Version of Record online : 22 SEP 2011, DOI: 10.1002/cpe.1858

  13. You have full text access to this Open Access content
    Spammers operations: a multifaceted strategic analysis

    Security and Communication Networks

    Volume 9, Issue 4, 10 March 2016, Pages: 336–356, O. Thonnard, Pierre-Antoine Vervier and M. Dacier

    Version of Record online : 9 OCT 2012, DOI: 10.1002/sec.640

  14. You have full text access to this Open Access content
    Detection of botnets before activation: an enhanced honeypot system for intentional infection and behavioral observation of malware

    Security and Communication Networks

    Volume 5, Issue 10, October 2012, Pages: 1094–1101, Young Hoon Moon, Eunjin Kim, Suh Mahn Hur and Huy Kang Kim

    Version of Record online : 6 FEB 2012, DOI: 10.1002/sec.431

  15. You have full text access to this Open Access content
    Secure and transparent network traffic replay, redirect, and relay in a dynamic malware analysis environment

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 626–640, Ying-Dar Lin, Tzung-Bi Shih, Yu-Sung Wu and Yuan-Cheng Lai

    Version of Record online : 21 MAR 2013, DOI: 10.1002/sec.764

  16. Internet Security and Networked Governance in International Relations

    International Studies Review

    Volume 15, Issue 1, March 2013, Pages: 86–104, Milton Mueller, Andreas Schmidt and Brenden Kuerbis

    Version of Record online : 10 APR 2013, DOI: 10.1111/misr.12024

  17. You have full text access to this Open Access content
    Behavior-based botnet detection in parallel

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1849–1859, Kuochen Wang, Chun-Ying Huang, Li-Yang Tsai and Ying-Dar Lin

    Version of Record online : 10 DEC 2013, DOI: 10.1002/sec.898

  18. You have full text access to this Open Access content
    Adaptive pattern mining model for early detection of botnet-propagation scale

    Security and Communication Networks

    Volume 5, Issue 8, August 2012, Pages: 917–927, Do Hoon Kim, Taek Lee, Jaewoo Kang, Hyunchoel Jeong and Hoh Peter In

    Version of Record online : 6 OCT 2011, DOI: 10.1002/sec.366

  19. You have full text access to this Open Access content
    Agent-based modeling of malware dynamics in heterogeneous environments

    Security and Communication Networks

    Volume 6, Issue 12, December 2013, Pages: 1576–1589, Abhijit Bose and Kang G. Shin

    Version of Record online : 25 FEB 2011, DOI: 10.1002/sec.298

  20. You have full text access to this Open Access content
    Characterizing flash events and distributed denial-of-service attacks: an empirical investigation

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 2222–2239, Abhinav Bhandari, Amrit Lal Sangal and Krishan Kumar

    Version of Record online : 6 MAR 2016, DOI: 10.1002/sec.1472