Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,330,012 papers from all fields of science
Search
Sign In
Create Free Account
Botnet
Known as:
C&C server
, Bot net
, Command and control server
Expand
A botnet is a number of Internet-connected computers communicating with other similar machines in which components located on networked computers…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
40-bit encryption
Asprox botnet
Atrivo
BASHLITE
Expand
Broader (2)
Cyberwarfare
Spamming
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
FAPA: flooding attack protection architecture in a cloud system
Kazi Zunnurhain
,
Susan V. Vrbsky
,
Ragib Hasan
International Journal of Cloud Computing
2014
Corpus ID: 16882931
The rate of acceptance of clouds each year is making cloud computing the leading IT computational technology. While cloud…
Expand
2013
2013
FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment
Earlence Fernandes
,
B. Crispo
,
M. Conti
IEEE Transactions on Information Forensics and…
2013
Corpus ID: 17398171
Many modern smartphones and car radios are shipped with embedded FM radio receiver chips. The number of devices with similar…
Expand
2013
2013
Misdirection attack in WSN: Topological analysis and an algorithm for delay and throughput prediction
R. S. Sachan
,
M. Wazid
,
D. P. Singh
,
Avita Katal
,
R. Goudar
International Symposium on Combinatorial…
2013
Corpus ID: 18255069
Wireless Sensor Network (WSN) has a great potential to be deployed in wide range of applications like consumer, industrial and…
Expand
2011
2011
WDA: A Web farm Distributed Denial Of Service attack attenuator
Ehud Doron
,
A. Wool
Comput. Networks
2011
Corpus ID: 15480350
2010
2010
Predictive Network Anomaly Detection and Visualization
M. Celenk
,
T. Conley
,
John Willis
,
James Graham
IEEE Transactions on Information Forensics and…
2010
Corpus ID: 15802090
Various approaches have been developed for quantifying and displaying network traffic information for determining network status…
Expand
2010
2010
Method ontology for intelligent network forensics analysis
Sherif Saad
,
I. Traoré
Eighth International Conference on Privacy…
2010
Corpus ID: 16000655
Network forensics is an after the fact process to investigate malicious activities conducted over computer networks by gathering…
Expand
2010
2010
A whitelist approach to protect SIP servers from flooding attacks
E. Chen
,
M. Itoh
IEEE International Workshop Technical Committee…
2010
Corpus ID: 9102402
As SIP-based VoIP services are expected to slowly replace the traditional PSTN services, SIP servers are becoming potential…
Expand
2007
2007
Toward Botnet Mesocosms
P. Barford
,
Michael Blodgett
Conference on Workshop on Hot Topics in…
2007
Corpus ID: 12658619
An in-depth understanding of botnet behavior is a precursor to building effective defenses against this serious and growing…
Expand
2006
2006
Wavelet based Denial-of-Service detection
G. Carl
,
R. Brooks
,
S. Rai
Computers & security
2006
Corpus ID: 46312339
Review
2001
Review
2001
How and Where Capital Account Liberalization Leads to Economic Growth
D. Quinn
2001
Corpus ID: 32098314
We utilize an empirical model of growth as a platform for examining the effects of capital account liberalization on growth…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE