Botnets and proactive system defense

被引:0
|
作者
Bambenek, John [1 ]
Klus, Agnes [1 ]
机构
[1] Univ Illinois, Coordinated Sci Lab, Urbana, IL 61801 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:117 / 130
页数:14
相关论文
共 50 条
  • [21] On-Demand Proactive Defense against Memory Vulnerabilities
    Chen, Gang
    Jin, Hai
    Zou, Deqing
    Dai, Weiqi
    NETWORK AND PARALLEL COMPUTING, NPC 2013, 2013, 8147 : 368 - 379
  • [22] Proactive Defense Model Based on Cyber Threat Analysis
    Osako, Takeshi
    Suzuki, Tomoyoshi
    Iwata, Yoichi
    FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2016, 52 (03): : 72 - 77
  • [23] A proactive defense mechanism for mobile communication user data
    Liu, Caixia
    Ji, Xinsheng
    Wu, Jiangxing
    Qin, Xiao
    SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (10)
  • [24] A proactive defense mechanism for mobile communication user data
    Caixia Liu
    Xinsheng Ji
    Jiangxing Wu
    Xiao Qin
    Science China Information Sciences, 2018, 61
  • [25] Proactive defense model based on cyber threat analysis
    Osako, Takeshi
    Suzuki, Tomoyoshi
    Iwata, Yoichi
    Fujitsu Scientific and Technical Journal, 2016, 52 (03): : 72 - 77
  • [26] A proactive defense mechanism for mobile communication user data
    Caixia LIU
    Xinsheng JI
    Jiangxing WU
    Xiao QIN
    Science China(Information Sciences), 2018, 61 (10) : 266 - 268
  • [27] SLINGbot: A System for Live Investigation of Next Generation Botnets
    Jackson, Alden W.
    Lapsley, David
    Jones, Christine
    Zatko, Mudge
    Golubitsky, Chaos
    Strayer, W. Timothy
    CATCH 2009: CYBERSECURITY APPLICATIONS AND TECHNOLOGY CONFERENCE FOR HOMELAND SECURITY, PROCEEDINGS, 2009, : 313 - 318
  • [28] Randomizing AMI Configuration for Proactive Defense in Smart Grid
    Ali, Muhammad Qasim
    Al-Shaer, Ehab
    Duan, Qi
    2013 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2013, : 618 - 623
  • [29] Practical proactive integrity preservation: A basis for malware defense
    Sun, Weiqing
    Sekar, R.
    Poothia, Gaurav
    Karandikar, Tejas
    PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, : 248 - 262
  • [30] Proactive Defense for Fog-to-Things Critical Infrastructure
    Khan, Muhammad Taimoor
    Akhunzada, Adnan
    Zeadally, Sherali
    IEEE COMMUNICATIONS MAGAZINE, 2022, 60 (12) : 44 - 49