Sign Up to like & get
recommendations!
1
Published in 2017 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2015.2496176
Abstract: Devices infected with malicious software typically form botnet armies under the influence of one or more command and control (C&C) servers. The botnet problem reached such levels where federal law enforcement agencies have to step…
read more here.
Keywords:
methodology;
botnet takedowns;
botnet;
still beheading ... See more keywords