Goel et al., 2006
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| US10587636B1 (en) | System and method for bot detection | |
| US9027135B1 (en) | Prospective client identification using malware attack detection | |
| US8561177B1 (en) | Systems and methods for detecting communication channels of bots | |
| US9942270B2 (en) | Database deception in directory services | |
| Freiling et al. | Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks | |
| Li et al. | Botnet: Survey and case study | |
| Wang et al. | Honeypot detection in advanced botnet attacks | |
| US8204984B1 (en) | Systems and methods for detecting encrypted bot command and control communication channels | |
| Stamm et al. | Drive-by pharming | |
| US20080196099A1 (en) | Systems and methods for detecting and blocking malicious content in instant messages | |
| Martin et al. | Raspberry Pi Malware: An analysis of cyberattacks towards IoT devices | |
| Govil et al. | Criminology of botnets and their detection and defense methods | |
| Simkhada et al. | Security threats/attacks via botnets and botnet detection & prevention techniques in computer networks: a review | |
| Ghorbani et al. | Network attacks | |
| Goel et al. | Botnets: the anatomy of a case | |
| Yoshioka et al. | Vulnerability in public malware sandbox analysis systems | |
| Jogdand et al. | Survey of different IDS using honeytoken based techniques to mitigate cyber threats | |
| WO2008086224A2 (en) | Systems and methods for detecting and blocking malicious content in instant messages | |
| Ranjith et al. | Design and implementation of a defense system from TCP injection attacks | |
| Agbogun et al. | Network security management: solutions to network intrusion related problems | |
| Wang et al. | The botnet problem | |
| Ramsbrock et al. | The Botnet Problem | |
| Zeltser | The evolution of malicious agents | |
| Sarvepalli | Designing Network Security Labs | |
| Thomas et al. | Bot countermeasures |