Results 91 to 100 of about 13,488 (258)

A Botnets Circumspection: The Current Threat Landscape, and What We Know So Far

open access: yesInformation, 2019
Botnets have carved a niche in contemporary networking and cybersecurity due to the impact of their operations. The botnet threat continues to evolve and adapt to countermeasures as the security landscape continues to shift.
Emmanuel C. Ogu   +3 more
doaj   +1 more source

Ensemble classification to predict botnet and its impact on IoT networks

open access: yesMeasurement: Sensors
The IoT (Internet of Things) has been rapidly growing to make a stronger influence on huge industrial systems. Since cybercriminals have made IoT a target for harmful operations such as botnets, an attack on the end nodes is now a possibility. Protecting
G. Chandana Swathi   +2 more
doaj   +1 more source

Botnet Badinage: Regulatory Approaches to Combating Botnets

open access: yes, 2011
A botnet is a collection of remotely controlled and compromised computers that are controlled by a bot master. Botnets are the main crime tool used by cybercriminals. To use an analogy, many crimes may be committed with a gun ranging from murder to rape to armed robbery to assault to breaking and entering to theft.
openaire   +2 more sources

BotCatcher:botnet detection system based on deep learning

open access: yesTongxin xuebao, 2018
Machine learning technology has wide application in botnet detection.However,with the changes of the forms and command and control mechanisms of botnets,selecting features manually becomes increasingly difficult.To solve this problem,a botnet detection ...
Di WU, Binxing FANG, Xiang CUI, Qixu LIU
doaj   +2 more sources

From BYOD to BYOA, Phishing, and Botnets [PDF]

open access: bronze, 2014
Seth Earley   +3 more
openalex   +1 more source

Modeling Peer-to-Peer Botnet on Scale-Free Network

open access: yesAbstract and Applied Analysis, 2014
Peer-to-peer (P2P) botnets have emerged as one of the serious threats to Internet security. To prevent effectively P2P botnet, in this paper, a mathematical model which combines the scale-free trait of Internet with the formation of P2P botnet is ...
Liping Feng   +4 more
doaj   +1 more source

Botnet Fingerprinting: Anomaly Detection in SMTP Conversations [PDF]

open access: green, 2017
Piotr Bazydlo   +2 more
openalex   +1 more source

Model-Based Framework for exploiting sensors of IoT devices using a Botnet: A case study with Android [PDF]

open access: green, 2022
Zubair Khaliq   +4 more
openalex   +1 more source

Home - About - Disclaimer - Privacy