Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference49 articles.
1. JACKSTRAWS: Picking command and control connections from bot traffic;Jacob,2011
2. Paint it black: Evaluating the effectiveness of malware blacklists;Kührer,2014
3. B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, G. Vigna, Your botnet is my botnet: analysis of a botnet takeover, in: Proceedings of the 16th ACM Conference on Computer and Communications Security, 2009, pp. 635–647.
4. S. Yadav, A.K.K. Reddy, A.N. Reddy, S. Ranjan, Detecting algorithmically generated malicious domain names, in: Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, 2010, pp. 48–61.
5. A comprehensive measurement study of domain generating malware;Plohmann,2016
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献