Botnets 2007
DOI: 10.1016/b978-159749135-8/50014-7
|View full text |Cite
|
Sign up to set email alerts
|

Responding to Botnets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2013
2013

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…processor speed, memory, network speed etc.) and to search for location of any leftover tools by an earlier infection [6]. It is imperative to study botnet behavior during these early phases of exploitation in order to neutralize a bot before it takes part in any attack.…”
Section: Related Workmentioning
confidence: 99%
“…processor speed, memory, network speed etc.) and to search for location of any leftover tools by an earlier infection [6]. It is imperative to study botnet behavior during these early phases of exploitation in order to neutralize a bot before it takes part in any attack.…”
Section: Related Workmentioning
confidence: 99%