Based on A novel key management construct P2P Botnet
碩士 === 國立雲林科技大學 === 資訊管理系碩士班 === 97 === In the recently many years, Internet malware attack have become better organized and more profitable. Email spam, extortion by denial-of-attack, and click fraud represent something of this emerging trend. “Botnet” is the main cause of these problems, many atta...
Main Authors: | Wun-Huei Su, 蘇文輝 |
---|---|
Other Authors: | Tung-Ming Koo |
Format: | Others |
Language: | zh-TW |
Published: |
2009
|
Online Access: | http://ndltd.ncl.edu.tw/handle/28169121560419305357 |
Similar Items
-
Detecting P2P Botnet in Software Defined Network
by: Su, Shang-Chiuan, et al.
Published: (2015) -
Construction P2P firewall HTTP-Botnet defense mechanism
by: Quan-Wei Guo, et al.
Published: (2010) -
Estimating the size of P2P Botnet
by: Wen-Chyi Liaw, et al.
Published: (2010) -
Advanced monitoring in P2P botnets
by: Karuppayah, Shankar
Published: (2016) -
Storm Worm: A P2P Botnet
by: Mukamurenzi, Nelly Marylise
Published: (2008)