Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,357,995 papers from all fields of science
Search
Sign In
Create Free Account
Botnet
Known as:
C&C server
, Bot net
, Command and control server
Expand
A botnet is a number of Internet-connected computers communicating with other similar machines in which components located on networked computers…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
40-bit encryption
Asprox botnet
Atrivo
BASHLITE
Expand
Broader (2)
Cyberwarfare
Spamming
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2020
Review
2020
Active Spectral Botnet Detection Based on Eigenvalue Weighting
Amin Azmoodeh
,
A. Dehghantanha
,
R. Parizi
,
S. Hashemi
,
Bahram Gharabaghi
,
Gautam Srivastava
Handbook of Big Data Privacy
2020
Corpus ID: 214642460
Botnets are a distributed network of infected nodes captured by cyber-criminals to design and implement a wide-range of cyber…
Expand
2014
2014
Red herrings and other misdirection in translation
K. Seago
2014
Corpus ID: 55237095
2013
2013
Misdirection attack in WSN: Topological analysis and an algorithm for delay and throughput prediction
R. S. Sachan
,
M. Wazid
,
D. P. Singh
,
Avita Katal
,
R. Goudar
International Symposium on Combinatorial…
2013
Corpus ID: 18255069
Wireless Sensor Network (WSN) has a great potential to be deployed in wide range of applications like consumer, industrial and…
Expand
2012
2012
A Study on Botnet Detection Techniques
S. Nair
2012
Corpus ID: 61192504
A botnet is a network of compromised computers, termed bots that are used for malicious purposes. When a computer becomes…
Expand
Review
2010
Review
2010
A Review and Evaluation of Engineering Education in Transition
L. Wilcox
,
M. S. Wilcox
IEEE Transforming Engineering Education: Creating…
2010
Corpus ID: 32160967
This paper revisits success stories of past projects aimed at education transition through integrated curricula…
Expand
2009
2009
Creating illusion in computer aided performance
J. Marshall
2009
Corpus ID: 46359064
This thesis studies the creation of illusion in computer aided performance. Illusion is created here by using deceptions, and a…
Expand
2006
2006
Taxonomy of Botnet Threats
A. Trend
,
Micro White
,
Paper November
2006
Corpus ID: 17585636
Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro, Incorporated. All other…
Expand
Review
2006
Review
2006
A Survey on Solutions to Distributed Denial of Service Attacks
Shibiao Lin Tzi-cker Chiueh
2006
Corpus ID: 16031707
Distributed Denial of Service (DDoS) attack is a large-scale, coordinated attack on the availability of services of a victim…
Expand
Review
2006
Review
2006
Cloaked Classification: The Misdirection Film and Generic Duplicity
Seth Friedman
2006
Corpus ID: 191842667
Spoiler Warnings: The Contemporary Misdirection Film and Generic Discourse ANYONE WHO HAS INADVERTENTLY EXPOSED A FILM'S…
Expand
2004
2004
The Honeywall CD-ROM
George Chamales
IEEE Security and Privacy
2004
Corpus ID: 17057548
The Honeynet Project is a non-profit research organization of security professionals dedicated to information security on the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE