Botnet communication patterns

G Vormayr, T Zseby, J Fabini - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Malicious botnets have become a common threat and pervade large parts of the Internet
today. Existing surveys and taxonomies focus on botnet topologies, command and control …

Do social bots dream of electric sheep? A categorisation of social media bot accounts

S Stieglitz, F Brachten, B Ross, AK Jung - arXiv preprint arXiv:1710.04044, 2017 - arxiv.org
So-called'social bots' have garnered a lot of attention lately. Previous research showed that
they attempted to influence political events such as the Brexit referendum and the US …

The socialbot network: when bots socialize for fame and money

Y Boshmaf, I Muslukhov, K Beznosov… - Proceedings of the 27th …, 2011 - dl.acm.org
Online Social Networks (OSNs) have become an integral part of today's Web. Politicians,
celebrities, revolutionists, and others use OSNs as a podium to deliver their message to …

Design and analysis of a social botnet

Y Boshmaf, I Muslukhov, K Beznosov, M Ripeanu - Computer Networks, 2013 - Elsevier
Online Social Networks (OSNs) have attracted millions of active users and have become an
integral part of today's web ecosystem. Unfortunately, in the wrong hands, OSNs can be …

Trends in steganography

E Zielińska, W Mazurczyk, K Szczypiorski - Communications of the ACM, 2014 - dl.acm.org
Trends in steganography Page 1 86 communications of the acm | march 2014 | vol. 57 | no. 3
review articles ar t b y an D ri J bor ys a ssocia te s the Mass Media anointed 2011 as the "year …

A generic statistical approach for spam detection in online social networks

F Ahmed, M Abulaish - Computer Communications, 2013 - Elsevier
In this paper, we present a generic statistical approach to identify spam profiles on Online
Social Networks (OSNs). Our study is based on real datasets containing both normal and …

Survey on botnet detection techniques: Classification, methods, and evaluation

Y Xing, H Shu, H Zhao, D Li… - Mathematical Problems in …, 2021 - Wiley Online Library
With the continuous evolution of the Internet, as well as the development of the Internet of
Things, smart terminals, cloud platforms, and social platforms, botnets showing the …

Detection of malicious social bots: A survey and a refined taxonomy

M Latah - Expert Systems with Applications, 2020 - Elsevier
Social bots represent a new generation of bots that make use of online social networks
(OSNs) as command and control (C&C) channels. Malicious social bots have been used as …

Critical analysis of DDoS—An emerging security threat over IoT networks

A Lohachab, B Karambir - Journal of Communications and Information …, 2018 - Springer
Ubiquitous computing facilitated by Internet of things (IoT) devices has made modern day life
easier across many areas. It offers capabilities to measure parameters associated with the …

Steganography in modern smartphones and mitigation techniques

W Mazurczyk, L Caviglione - IEEE Communications Surveys & …, 2014 - ieeexplore.ieee.org
By offering sophisticated services and centralizing a huge volume of personal data, modern
smartphones changed the way we socialize, entertain and work. To this aim, they rely upon …