Semantic Scholar uses AI to extract papers important to this topic.
Various families of malware use domain generation algorithms (DGAs) to generate a large number of pseudo-random domain names to… Expand Broadband wireless communication is of critical importance during public safety scenarios as it facilitates situational awareness… Expand The Internet traffic analysis is important to network management,and extracting the baseline traffic patterns is especially… Expand Conficker is the most recent widespread, well-known worm/bot. According to several reports, it has infected about 7 million to 15… Expand The rise of spam and other anti-social behavior on the Internet has
led to the creation of shared blacklists and whitelists of IP… Expand The nature of information has changed dramatically during the past 25 years. The digital age has redefined the nature of a… Expand Botnets--networks of (typically compromised) machines--are often used for nefarious activities (e.g., spam, click fraud, denial… Expand This paper studies the network-level behavior of spammers, including: IP address ranges that send the most spam, common spamming… Expand We present new optical and near-IR spectroscopy, as well as new high dynamic range, arcsecond-resolution VLA radio maps, of BL… Expand Of all the astronomical sources of gravitational radiation, the ringdown waveform arising from a small perturbation of a spinning… Expand