Botnet business models, takedown attempts, and the darkweb market: A survey
Botnets account for a substantial portion of cybercrime. Botmasters utilize darkweb
marketplaces to promote and provide their services, which can vary from renting or buying a …
marketplaces to promote and provide their services, which can vary from renting or buying a …
[PDF][PDF] Detection of Digital Law Issues and Implication for Good Governance Policy in Indonesia
A Marwan, F Bonfigli - Bestuur, 2022 - academia.edu
Good governance is a meta-legal theory that can be applied to any legal problem. At
present, I use this concept to delineate the development of digital law and society in …
present, I use this concept to delineate the development of digital law and society in …
[PDF][PDF] Analysis of Botnet Attack Communication Pattern Behavior on Computer Networks.
Botnets are a severe threat to a computer network, affecting various aspects of security
systems, including spreading malicious programs, phishing, sending spam messages, and …
systems, including spreading malicious programs, phishing, sending spam messages, and …
B-CAT: a model for detecting botnet attacks using deep attack behavior analysis on network traffic flows
Threats on computer networks have been increasing rapidly, and irresponsible parties are
always trying to exploit vulnerabilities in the network to do various dangerous things. One …
always trying to exploit vulnerabilities in the network to do various dangerous things. One …
Risks to cybersecurity from data localization, organized by techniques, tactics and procedures
P Swire, DB Kennedy-Mayo, D Bagley… - Journal of Cyber …, 2024 - Taylor & Francis
The risks of data localization to cybersecurity–organizational effects”, we provided a
framework for the risks of data localization to cybersecurity, finding that 13 of 14 ISO 27002 …
framework for the risks of data localization to cybersecurity, finding that 13 of 14 ISO 27002 …
Designing Intelligent Agents in Normative Systems Toward Data Regulation Representation
Personal data protection regulation plays an important role in defining the rights and
obligations of the agents involved in processing personal data (ie, data subjects, controllers …
obligations of the agents involved in processing personal data (ie, data subjects, controllers …
Botnet Dataset Overview Using Statistical Approach Based on Time Gap Activity Analysis
Botnet malware is a malicious activity that needs to be detected accurately. Several botnet
detection models have been introduced using a mining-based method. The distribution …
detection models have been introduced using a mining-based method. The distribution …
[HTML][HTML] Simultaneous Botnet Dataset Generator: A simulation tool for generating a botnet dataset with simultaneous attack characteristic
A botnet attack must be handled appropriately, such that botnet detection models have been
developed, whose performance is supported by datasets obtained through recording actual …
developed, whose performance is supported by datasets obtained through recording actual …
Detecting Botnet Spam Activity by Analyzing Network Traffic Using Two-Stack Decision Tree Algorithms
Botnets are a type of malware that threatens network security. One of the frequently
encountered botnet threats is SPAM. Many studies focus on building detection models to …
encountered botnet threats is SPAM. Many studies focus on building detection models to …
[PDF][PDF] ARTIFICIAL INTELLIGENCE BASED DATA TRACKING METHODS FOR SUPPLY CHAIN PERFORMANCES OPTIMIZATION
VA Matayo, HS Jibrin, MA Isah, AA Aminu - adolescence - researchgate.net
This study explores the integration of artificial intelligence (AI) in data tracking and supply
chain management. It examines the methods, performance, and limitations of these …
chain management. It examines the methods, performance, and limitations of these …