Login / Signup

How to Steal a Botnet and What Can Happen When You Do.

Richard A. Kemmerer
Published in: ICICS (2009)
Keyphrases
  • peer to peer
  • denial of service attacks
  • ddos attacks
  • network traffic
  • identity theft
  • website
  • active learning
  • control system
  • management system
  • network security