IEEE Security and Privacy
Botnet: classification, attacks, detection, tracing, and preventive measures
ICICIC '09 Proceedings of the 2009 Fourth International Conference on Innovative Computing, Information and Control
Bot detection evasion: a case study on local-host alert correlation bot detection methods
Security and Communication Networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.01 |
No longer satisfied with compromising and controlling individual computers, a new breed of hackers have set their sights on virtual networks of zombie systems, which they use in concert to accomplish various nefarious deeds. Beware the botnet.