لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
SANS Institute Info Sec Reading Room provided adescription on “Bot ...
H. Rouhani Zeidanloo, A. Bt Manaf, P. Vahdani, F ...
Tabatabaei, and M. Zamani, “Botnet Detection Based onTraffic Monitoring,” IEEE ...
C. Li, W. Jiang, and X. Zou, “Botnet: Survey and ...
Botnet s cams are exploding ...
http://www.contentagenda.com/articleXml/LN۷۶۰۹۹۹۲۴۵.html?industryid=۴۵۱۷۷ ...
B. AsSadhan, J. Moura, D. Lapsley, C. Jones, and W ...
Strayer, “Detecting botnets using command and controltraffic,” in: Eighth IEEE ...
P. Bacher, T. Holz, M. Kotter, and G. Wicherski, “KnowYour ...
Z. Zhu, G. Lu, Y. Chen, Z. J. Fu, P. ...
M. Feily, A. Shahrestani, and S. Ramadass, “A survey ofbotnet ...
Y. Shin and E. Im, “A survey of botnet: consequences,”defenses ...
Symantec, “Spybot worm,” ۲۰۰۳ ...
J. Liu, Y. Xiao, K. Ghaboosi, H. Deng, and J. ...
D. Plohmann, E. Gerhards-Padilla, and F. Leder, “Botnets:Detection, Measurement, Disinfection ...
B. AsSadhan, J. Moura, D. Lapsley, C. Jones, and W ...
Strayer, “Detecting botnets using command and controltraffic, in: Eighth IEEE ...
M. M. Masud, J. Gao, L. Khan, J. Han, and ...
Thuraisingham, “Mining Concept-Drifting Data Stream toDetect Peer to Peer Botnet ...
S. S. C. Silva, R. M. P. Silva, R. C. ...
Salles, “A Survey computer networks,” Elsevier, ۲۰۱۲ ...
EggHeads, “EggHeads.org-eggdrop development,” ۱۹۹۳ ...
T. Micro, “Worm AgoBot,” ۲۰۰۴ ...
trendmicro.com/ArchiveMalware.aspx?language=us&name=WORMAGOBOT.XE> ...
T. Micro, “Worm SDBot,” ۲۰۰۳ ...
trendmicro ...
com/ArchiveMalware.aspx?language=us&name=WORMSDJ. B. Grizzard, V. Sharma, C. Nunnery, B. B Kang, ...
Dagon, “Peer-to-peer botnets: overview and case study, in:Proceedings of the ...
S. S. C. Silva, R. M. P. Silva, R. C. ...
M. Fossi, G. Y. Egan, K. Haley, E. Johnson, T. ...
Adams, J. Blackbird, M. K. Low, D. Mazurek, D ...
McKinney, and P. Wood, “Symantec Internet SecurityThreat Report – Trends ...
Freiling, C. Felix, T. Holz, and G. Wicherski, “Botnettracking: Exploring ...
H. Choi, H. Lee, and H. Kim, “BotGAD: detecting botnetsby ...
R. Puri, Bots & Botnet: An Overview, SANS InstituteInfoSec Reading ...
C. Schiller and J. Binkley, “Botnets: The Killer WebApplications,” Syngress ...
L. Liu, S. Chen, G. Yan, and Z. Zhang, “BotTracer:Execution-Based ...
T. Micro, “Taxonomy of Botnet Threats,” Technical Report,Trend Micro White ...
E. Cooke, F. Jahanian, and D. McPherson, “The zombieroundup: understanding, ...
M. Jelasity and V. Bilicki, “Towards automated detection ofpeer-to-peer botnets: ...
P. Wang, L. Wu, B. Aslam, C. Zou, “A systematic ...
P. Wang, S. Sparks, and C. Zou, “An advanced hybrid ...
J. B Grizzard, V. Sharma, C. Nunnery, B. B Kang, ...
Dagon, “Peer-to-peer botnets: overview and case study,” In:Proceedings of the ...
E. W. Middelesch, “Anonymous and hidden communicationchannels: a perspective on ...
H. R. Zeidanloo, M. J. Shooshtari, P. V. Amoli, M. ...
–۱۶۲, ۲۰۱۰ ...
F. C. Freiling, T. Holz, and G. Wicherski, “Botnet tracking:exploring ...
J. Goebel and T. Holz, “Rishi: identify bot contaminatedhosts by ...
Y. Kugisaki, Y. Kasahara, Y. Hori, and K. Sakurai, “Botdetection ...
–۳۰۶, ۲۰۰۷ ...
J. R. Binkley and S. Singh, “An algorithm for anomalybasedbotnet ...
, USENIX Association, Berkeley, CA, USA, p. ۷, ۲۰۰۶ ...
G. Gu, V. Yegneswaran, P. Porras, J. Stoll, and W. ...
G. Gu, R. Perdisci, J. Zhang, and W. Lee, “BotMiner:clustering ...
A. Nappa, A. Fattori, M. Balduzzi, M. Dell’Amico, and L ...
Cavallaro, “Take a deep breath: a stealthy, resilient and costeffectivebotnet ...
H. Choi, H. Lee, and H. Kim, “BotGAD: detecting botnetsby ...
A. Madhukar and C. Williamson, “A longitudinal study ofp۲p traffic ...
C. Livadas, R. Walsh, D. Lapsley, and W. Strayer, “UsingMachine ...
J. Goebel and T. Holz, “Rishi: Identify Bot ContaminatedHosts by ...
W. Wang, B. Fang, Z. Zhang, and C. Li, “A ...
G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. ...
P. Wurzinger, L. Bilge, T. Holz, J. Goebel, C. Kruegel, ...
I. Castle and E. Buckley, “The automatic Discovery,Identification and Measurement ...
Y. Zhao, Y. Xie, F. Yu, Q. Ke, Y. Yu, ...
Gillum, “BotGraph: Large Scale Spamming BotnetDetection”, in Proceedings of the ...
S. Nagaraja, P. Mittal, C.-Y. Hong, M. Caesar, and N ...
Borisov, “Botgrep: finding p۲p bots with structured graphanalysis,” In: Proceedings ...
B. Shirley and C. D. Mano, “A Model for Covert ...
۶۳۲, ۲۰۰۸ ...
A. Nappa, A. Fattori, M. Balduzzi, M. Dell’Amico, and L ...
Cavallaro, “Take a deep breath: a stealthy, resilient and costeffectivebotnet ...
T. Micro, “Taxonomy of Botnet Threats,” Technical Report,Trend Micro White ...
E. Stinson and J. C. Mitchell, “Towards systematicevaluation of the ...
D. Zhang, C. Zheng, H. Zhang, and H. Yu, “Identificationand ...
J. Nazario and T. Holz, “As the net churns: fast-flux ...
Eaton, “Behavioral analysis of fast flux service networks,”In: Proceedings of ...
:۱-۴۸:۴, ۲۰۰۹ ...
T. M. S. Labs, “Security Labs Report January – June ...
T. Barabosch, A. Wichmann, F. Leder, and E. Gerhards-Padilla, “Automatic ...
S. Yadav, A. K. Krishna Reddy, and A. L. NarasimhaReddy, ...
B. Stone-Gross, M. Cova, B. Gilbert, L. Cavallaro, C ...
Kruegel, G. Vigna, and R. Kemmerer, “Your Botnet is MyBotnet: ...
R. sharifnia and M. Abadi, “A Novel Reputation System toDetectDGA-Based ...
S. Yadav and A. L. Narasimha Reddy, “Winning with DNSFailures: ...
H. Choi and H. Lee, “Identifying Botnets by CapturingGroup Activities ...
, no. ۱, pp. ۲۰–۳۳, January ۲۰۱۲ ...
C.-Y. Huang, “Effective Bot Host Detection Based onNetwork Failure Models,” ...
, pp. ۵۱۴–۵۲۵, February ۲۰۱۳ ...
E. Kartaltepe, J. Morales, S. Xu, and R. Sandhu, “SocialNetwork-Based ...
J. Baltazar, J. Costoya, and R. Flores, “The real face ...
S. Nagaraja, A. Houmansadr, P. Piyawongwisal, V. Singh, P ...
Agarwal,and N. Borisov, “Stegobot: a covert social networkbotnet,” In: Information ...
C. Serdar, C. E. Adviser-Brodley, and E. H. Adviser-Spafford, “Network ...
Z. Sebastian, G. J. Armitage, and P. Branch, “A survey ...
نمایش کامل مراجع