Login / Signup

How to steal a botnet and what can happen when you do.

Richard A. Kemmerer
Published in: ICSM (2011)
Keyphrases
  • peer to peer
  • network traffic
  • denial of service attacks
  • ddos attacks
  • identity theft
  • databases
  • information technology
  • high dimensional
  • np hard