Takedown: Red Sabre

Known as: Takedown 
Takedown: Red Sabre is a tactical shooter video game for Microsoft Windows and Xbox 360. It was released on September 20, 2013 for Windows via Steam… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1990-2016
051019902016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Bulletproof hosting Autonomous Systems (ASes)—malicious ASes fully dedicated to supporting cybercrime—provide freedom and… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
2014
2014
Modern botnets are increasingly shifting towards overlay networks, using peer-to-peer (P2P) protocols, for command and control (C… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
2013
2013
Centralized botnets are easy targets for takedown efforts by computer security researchers and law enforcement. Thus, botnet… (More)
  • figure 1
  • figure 2
  • table I
  • table II
  • table III
Is this relevant?
2013
2013
Devices infected with malicious software typically form botnet armies under the influence of one or more command and control (C&C… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
2013
2013
Centralized botnets are easy targets for takedown efforts by computer security researchers and law enforcement. Thus, botnet… (More)
  • figure 1
  • figure 2
  • table I
  • table II
  • table III
Is this relevant?
2011
2011
Phishing exhibits characteristics of asymmetric conflict and guerrilla warfare. Phishing sites, upon detection, are subject to… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2011
2011
The ability to remote-control infected PCs is a fundamental component of modern malware campaigns. At the same time, the command… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Recent work has leveraged botnet infiltration techniques to track the activities of bots over time, particularly with regard to… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2008
Highly Cited
2008
While botnets themselves provide a rich platform for financial gain for the botnet master, the use of the infected hosts as… (More)
  • table 1
  • figure 1
  • figure 2
  • table 2
  • figure 3
Is this relevant?
2008
2008
In the BitTorrent protocol, all clients interested in downloading a particular file contact a tracker to obtain a list of other… (More)
Is this relevant?