Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,058,992 papers from all fields of science
Search
Sign In
Create Free Account
Botnet
Known as:
C&C server
, Bot net
, Command and control server
Expand
A botnet is a number of Internet-connected computers communicating with other similar machines in which components located on networked computers…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
40-bit encryption
Asprox botnet
Atrivo
BASHLITE
Expand
Broader (2)
Cyberwarfare
Spamming
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment
Earlence Fernandes
,
B. Crispo
,
M. Conti
IEEE Transactions on Information Forensics and…
2013
Corpus ID: 17398171
Many modern smartphones and car radios are shipped with embedded FM radio receiver chips. The number of devices with similar…
Expand
2011
2011
Characterizing Attackers and Attacks: An Empirical Study
Gabriel Salles-Loustau
,
R. Berthier
,
Etienne Collange
,
Bertrand Sobesto
,
M. Cukier
IEEE 17th Pacific Rim International Symposium on…
2011
Corpus ID: 10244381
This paper describes an empirical research study to characterize attackers and attacks against targets of opportunity. A honey…
Expand
Highly Cited
2010
Highly Cited
2010
Ontological realism: Methodology or misdirection?
G. H. Merrill
Appl. Ontology
2010
Corpus ID: 8527360
In a series of papers over a period of several years Barry Smith and Werner Ceusters have offered a number of cogent criticisms…
Expand
Highly Cited
2010
Highly Cited
2010
Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures
Erhan J. Kartaltepe
,
J. Morales
,
Shouhuai Xu
,
R. Sandhu
International Conference on Applied Cryptography…
2010
Corpus ID: 2451437
Botnets have become a major threat in cyberspace. In order to effectively combat botnets, we need to understand a botnet's…
Expand
2010
2010
Predictive Network Anomaly Detection and Visualization
M. Celenk
,
T. Conley
,
John Willis
,
James Graham
IEEE Transactions on Information Forensics and…
2010
Corpus ID: 15802090
Various approaches have been developed for quantifying and displaying network traffic information for determining network status…
Expand
2010
2010
Method ontology for intelligent network forensics analysis
Sherif Saad
,
I. Traoré
Eighth International Conference on Privacy…
2010
Corpus ID: 16000655
Network forensics is an after the fact process to investigate malicious activities conducted over computer networks by gathering…
Expand
2010
2010
A whitelist approach to protect SIP servers from flooding attacks
E. Chen
,
M. Itoh
IEEE International Workshop Technical Committee…
2010
Corpus ID: 9102402
As SIP-based VoIP services are expected to slowly replace the traditional PSTN services, SIP servers are becoming potential…
Expand
2008
2008
DDoS: DDoS attack evolution
Jose Nazario
2008
Corpus ID: 167973744
2007
2007
Toward Botnet Mesocosms
P. Barford
,
Michael Blodgett
Conference on Workshop on Hot Topics in…
2007
Corpus ID: 12658619
An in-depth understanding of botnet behavior is a precursor to building effective defenses against this serious and growing…
Expand
2006
2006
Wavelet based Denial-of-Service detection
G. Carl
,
R. Brooks
,
S. Rai
Computers & security
2006
Corpus ID: 46312339
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required