Botnet business models, takedown attempts, and the darkweb market: A survey

D Georgoulias, JM Pedersen, M Falch… - ACM Computing …, 2023 - dl.acm.org
Botnets account for a substantial portion of cybercrime. Botmasters utilize darkweb
marketplaces to promote and provide their services, which can vary from renting or buying a …

[PDF][PDF] Detection of Digital Law Issues and Implication for Good Governance Policy in Indonesia

A Marwan, F Bonfigli - Bestuur, 2022 - academia.edu
Good governance is a meta-legal theory that can be applied to any legal problem. At
present, I use this concept to delineate the development of digital law and society in …

[PDF][PDF] Analysis of Botnet Attack Communication Pattern Behavior on Computer Networks.

MAR Putra, T Ahmad, DP Hostiadi - International Journal of Intelligent …, 2022 - inass.org
Botnets are a severe threat to a computer network, affecting various aspects of security
systems, including spreading malicious programs, phishing, sending spam messages, and …

B-CAT: a model for detecting botnet attacks using deep attack behavior analysis on network traffic flows

MAR Putra, T Ahmad, DP Hostiadi - Journal of Big Data, 2024 - Springer
Threats on computer networks have been increasing rapidly, and irresponsible parties are
always trying to exploit vulnerabilities in the network to do various dangerous things. One …

Risks to cybersecurity from data localization, organized by techniques, tactics and procedures

P Swire, DB Kennedy-Mayo, D Bagley… - Journal of Cyber …, 2024 - Taylor & Francis
The risks of data localization to cybersecurity–organizational effects”, we provided a
framework for the risks of data localization to cybersecurity, finding that 13 of 14 ISO 27002 …

Designing Intelligent Agents in Normative Systems Toward Data Regulation Representation

PH Alves, F Correia, I Frajhof, CS De Souza… - IEEE …, 2023 - ieeexplore.ieee.org
Personal data protection regulation plays an important role in defining the rights and
obligations of the agents involved in processing personal data (ie, data subjects, controllers …

Botnet Dataset Overview Using Statistical Approach Based on Time Gap Activity Analysis

MAR Putra, T Ahmad… - 2023 11th International …, 2023 - ieeexplore.ieee.org
Botnet malware is a malicious activity that needs to be detected accurately. Several botnet
detection models have been introduced using a mining-based method. The distribution …

[HTML][HTML] Simultaneous Botnet Dataset Generator: A simulation tool for generating a botnet dataset with simultaneous attack characteristic

MAR Putra, DP Hostiadi, T Ahmad - Software Impacts, 2022 - Elsevier
A botnet attack must be handled appropriately, such that botnet detection models have been
developed, whose performance is supported by datasets obtained through recording actual …

Detecting Botnet Spam Activity by Analyzing Network Traffic Using Two-Stack Decision Tree Algorithms

MAR Putra, T Ahmad, RM Ijtihadie… - … of Computer Science …, 2023 - ieeexplore.ieee.org
Botnets are a type of malware that threatens network security. One of the frequently
encountered botnet threats is SPAM. Many studies focus on building detection models to …

[PDF][PDF] ARTIFICIAL INTELLIGENCE BASED DATA TRACKING METHODS FOR SUPPLY CHAIN PERFORMANCES OPTIMIZATION

VA Matayo, HS Jibrin, MA Isah, AA Aminu - adolescence - researchgate.net
This study explores the integration of artificial intelligence (AI) in data tracking and supply
chain management. It examines the methods, performance, and limitations of these …