Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,935,570 papers from all fields of science
Search
Sign In
Create Free Account
Botnet
Known as:
C&C server
, Bot net
, Command and control server
Expand
A botnet is a number of Internet-connected computers communicating with other similar machines in which components located on networked computers…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
40-bit encryption
Asprox botnet
Atrivo
BASHLITE
Expand
Broader (2)
Cyberwarfare
Spamming
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2020
Review
2020
Active Spectral Botnet Detection Based on Eigenvalue Weighting
Amin Azmoodeh
,
A. Dehghantanha
,
R. Parizi
,
S. Hashemi
,
Bahram Gharabaghi
,
Gautam Srivastava
Handbook of Big Data Privacy
2020
Corpus ID: 214642460
Botnets are a distributed network of infected nodes captured by cyber-criminals to design and implement a wide-range of cyber…
Expand
2016
2016
Technical Report 2016-1 — Royal Holloway , University of London Misleading Metrics : On Evaluating Machine Learning for Malware with Confidence
Roberto Jordaney
,
I. Nouretdinov
2016
Corpus ID: 26274173
Malware pose a serious and challenging threat across the Internet and the need for automated learning-based approaches has become…
Expand
Review
2015
Review
2015
Mobile Botnet Attacks - an Emerging Threat: Classification, Review and Open Issues
Ahmad Karim
,
Syed Adeel Ali Shah
,
R. Salleh
,
Muhammad Arif
,
R. M. Noor
,
Shahaboddin Shamshirband
KSII Transactions on Internet and Information…
2015
Corpus ID: 18366581
The rapid development of smartphone technologies have resulted in the evolution of mobile botnets. The implications of botnets…
Expand
2013
2013
Misdirection attack in WSN: Topological analysis and an algorithm for delay and throughput prediction
R. S. Sachan
,
M. Wazid
,
D. P. Singh
,
Avita Katal
,
R. Goudar
International Symposium on Combinatorial…
2013
Corpus ID: 18255069
Wireless Sensor Network (WSN) has a great potential to be deployed in wide range of applications like consumer, industrial and…
Expand
2012
2012
A Study on Botnet Detection Techniques
S. Nair
2012
Corpus ID: 61192504
A botnet is a network of compromised computers, termed bots that are used for malicious purposes. When a computer becomes…
Expand
2011
2011
Charmed Circle of Motherhood: How Discourses of Motherhood Discredit and Empower Young and Low-Income Mothers.
V. Baker
,
M. Lynn
2011
Corpus ID: 140793455
Review
2010
Review
2010
A Review and Evaluation of Engineering Education in Transition
L. Wilcox
,
M. S. Wilcox
IEEE Transforming Engineering Education: Creating…
2010
Corpus ID: 32160967
This paper revisits success stories of past projects aimed at education transition through integrated curricula…
Expand
2009
2009
Creating illusion in computer aided performance
J. Marshall
2009
Corpus ID: 46359064
This thesis studies the creation of illusion in computer aided performance. Illusion is created here by using deceptions, and a…
Expand
Review
2006
Review
2006
A Survey on Solutions to Distributed Denial of Service Attacks
Shibiao Lin Tzi-cker Chiueh
2006
Corpus ID: 16031707
Distributed Denial of Service (DDoS) attack is a large-scale, coordinated attack on the availability of services of a victim…
Expand
Review
2006
Review
2006
Cloaked Classification: The Misdirection Film and Generic Duplicity
Seth Friedman
2006
Corpus ID: 191842667
Spoiler Warnings: The Contemporary Misdirection Film and Generic Discourse ANYONE WHO HAS INADVERTENTLY EXPOSED A FILM'S…
Expand