Survey and taxonomy of botnet research through life-cycle
RA Rodríguez-Gómez, G Maciá-Fernández… - ACM Computing …, 2013 - dl.acm.org
Of all current threats to cybersecurity, botnets are at the top of the list. In consequence,
interest in this problem is increasing rapidly among the research community and the number …
interest in this problem is increasing rapidly among the research community and the number …
Eclipse attacks on {Bitcoin's}{peer-to-peer} network
We present eclipse attacks on bitcoin's peer-to-peer network. Our attack allows an adversary
controlling a sufficient number of IP addresses to monopolize all connections to and from a …
controlling a sufficient number of IP addresses to monopolize all connections to and from a …
Botnet business models, takedown attempts, and the darkweb market: A survey
Botnets account for a substantial portion of cybercrime. Botmasters utilize darkweb
marketplaces to promote and provide their services, which can vary from renting or buying a …
marketplaces to promote and provide their services, which can vary from renting or buying a …
New facets of mobile botnet: architecture and evaluation
M Anagnostopoulos, G Kambourakis… - International Journal of …, 2016 - Springer
It is without a doubt that botnets pose a growing threat to the Internet, with DDoS attacks of
any kind carried out by botnets to be on the rise. Nowadays, botmasters rely on advanced …
any kind carried out by botnets to be on the rise. Nowadays, botmasters rely on advanced …
A comprehensive study of email spam botnet detection
The problem of email spam has grown significantly over the past few years. It is not just a
nuisance for users but also it is damaging for those who fall for scams and other attacks. This …
nuisance for users but also it is damaging for those who fall for scams and other attacks. This …
Design of SMS commanded-and-controlled and P2P-structured mobile botnets
Botnets are one of the most serious security threats to the Internet and personal computer
(PC) users. Although botnets have not yet caused major outbreaks in the mobile world, with …
(PC) users. Although botnets have not yet caused major outbreaks in the mobile world, with …
A reconfigurable shared scan-in architecture
S Samaranayake, E Gizdarski… - … . 21st VLSI Test …, 2003 - ieeexplore.ieee.org
In this paper, an efficient technique for test data volume reduction based on the shared scan-
in (Illinois Scan) architecture and the scan chain reconfiguration (Dynamic Scan) …
in (Illinois Scan) architecture and the scan chain reconfiguration (Dynamic Scan) …
LNBot: a covert hybrid botnet on bitcoin lightning network for fun and profit
While various covert botnets were proposed in the past, they still lack complete
anonymization for their servers/botmasters or suffer from slow communication between the …
anonymization for their servers/botmasters or suffer from slow communication between the …
5G Aviation Networks Using Novel AI Approach for DDoS Detection.
H Whitworth, S Al-Rubaye, A Tsourdos, J Jiggins - IEEE Access, 2023 - ieeexplore.ieee.org
The advent of Fifth Generation (5G) technology has ushered in a new era of advancements
in the aviation sector. However, the introduction of smart infrastructure has significantly …
in the aviation sector. However, the introduction of smart infrastructure has significantly …