Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Proactive policy measures by Internet service providers against Botnets + (0199 JL)
- Mocbot spam analysis + (August 15, 2006)
- Peer-to-peer botnets: overview and case study + (2007)
- Poison Ivy 2.3.0 Documentation + (2007)
- Mpack installs ultra-invisible trojan + (July 5, 2007)
- The world's biggest botnets + (September 11, 2007)
- Bot Roast II nets 8 individuals + (November 29, 2007)
- Operation Bot Roast II + (November 29, 2007)
- SGNET: a worldwide deployable framework to support the analysis of malware threat models + (2008)
- Top spam botnets exposed + (April 8, 2008)
- Encyclopedia entry: Win32/Oderoor + (April 17, 2008)
- Kraken botnet infiltration + (April 28, 2008)
- Owning Kraken zombies + (April 28, 2008)
- The Coreflood report + (August 6, 2008)
- Research Win32/Slenfbot + (August 16, 2008)
- One Sinowal trojan + one gang = hundreds of thousands of compromised accountS + (October 31, 2008)
- Un WOMBAT pour évaluer la cybercriminalité + (2009)
- Xarvester, the new Srizbi? + (January 12, 2009)
- OSX.Iservice technical details + (January 22, 2009)
- 'Tigger' trojan keeps security researchers hopping + (March 4, 2009)
- Cimbot - A technical analysis + (March 16, 2009)