Login / Signup
How to steal a botnet and what can happen when you do.
Richard A. Kemmerer
Published in:
ICSM (2011)
Keyphrases
</>
peer to peer
network traffic
denial of service attacks
ddos attacks
identity theft
databases
information technology
high dimensional
np hard