ZeroAccess botnet

Known as: ZeroAccess, Zero Access, Sirefef 
ZeroAccess is a Trojan horse computer malware that affects Microsoft Windows operating systems. It is used to download other malware on an infected… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Botnet is one of the most serious threats to cyber security as it provides a distributed platform for several illegal activities… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
Review
2014
Review
2014
  • Ms Cheenu
  • 2014
Today ZeroAccess is one of the widespread threats over the internet. The total number of infected systems is in the tens of… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
2014
2014
Botnets have become a general-purpose platform to perform malicious cyber-activity and extortion. Botnets use specially designed… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
2014
2014
Click fraud is a scam that hits a criminal sweet spot by both tapping into the vast wealth of online advertising and exploiting… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Centralized botnets are easy targets for takedown efforts by computer security researchers and law enforcement. Thus, botnet… (More)
  • figure 1
  • figure 2
  • table I
  • table II
  • table III
Is this relevant?
2013
2013
ZeroAccess is a large sophisticated botnet whose modular design allows new “modules” to be downloaded on demand. Typically each… (More)
  • figure 1
  • table 1
  • figure 2
  • table 2
  • table 3
Is this relevant?
2013
2013
ZeroAccess is one of the most widespread threats currently plaguing the Internet. The total number of infected machines is in the… (More)
  • figure 1
  • figure 4
  • figure 2
  • figure 6
  • figure 7
Is this relevant?
2012
2012
In this paper, we propose a systematic approach to designing and deploying a RFID Assisted Navigation System (RFID-ANS) for… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2006
2006
Analysis of worst-case message transmission times in CAN networks is usually performed assuming the availability of an infinite… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
1999
1999
Dynamic Associative Access Memory (DAAM) chips are processor-in-memory chips wherein a large number of small processing elements… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?