Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
With the raise in practice of Internet, in social, personal, commercial and other aspects of life, the cybercrime is as well escalating at an alarming rate. Such usage of Internet in diversified areas also augmented the illegal... more
    • by 
    •   9  
      Computer ScienceForensicsComputer ForensicsNetwork Security
The results of botnet detection methods are usually presented without any comparison. Although it is generally accepted that more comparisons with third-party methods may help to improve the area, few papers could do it. Among the factors... more
    • by 
    •   8  
      Computer ScienceMachine LearningNetwork SecurityComputer Networks
This paper proposes an improved detection algorithm for LTE Random Access preamble detection and evaluates the performance of the algorithm with respect to the performance of algorithms proposed in the literature using MDP metric.... more
    • by  and +2
    •   24  
      Long Term Evolution (LTE)LTEGSM, WiMAX, LTEWireless technology (3G & LTE)
–The Spam Emails are regularly causing huge losses to business on a regular basis. The Spam filtering is an automated technique to identity SPAM and HAM (Non-Spam). The Web Spam filters can be categorized as: Content based spam filters... more
    • by 
    •   22  
      SPAMBotnet attacksBotnetsAnti spam
Malware create a seriously problem to the infected computer. People was believe that installing antivirus can mitigate the computer being infected. Unfortunately, malware designer actively create botnet being hide from the antivirus. In... more
    • by 
    •   4  
      Malware AnalysisBotnetsBotnet Detection AlgorithmsMalware Reverse Engineering
    • by 
    •   171  
      HistoryCultural HistoryEconomic HistorySociology
During the last decade, botnet emerged as one of the most serious malware which possess a serious threat to the Internet. Due to significant research effort in this domain there are many different detection methods based on diverse... more
    • by 
    •   4  
      BotnetsBotnetBotnet Detection AlgorithmsBotnet Detection
    • by 
    •   5  
      Botnet Detection AlgorithmsDetection of Botnets Using Combined Host- and Network-Level InformationUsing uncleanliness to predict future botnet addressesUsing Spamming Botnets: Signatures and Characteristics
Botnets have in recent times, become a very major challenge in the cyberspace. The Global Internet has experienced tremendous attacks designed mainly to disable internet infrastructure on one hand, while in most other cases people and... more
    • by  and +1
    •   4  
      Cyber SecurityBotnet Detection AlgorithmsDetection of Botnets Using Combined Host- and Network-Level InformationBotnet Detection
With the raise in practice of Internet, in social, personal, commercial and other aspects of life, the cybercrime is as well escalating at an alarming rate. Such usage of Internet in diversified areas also augmented the illegal... more
    • by 
    •   9  
      Computer ScienceForensicsComputer ForensicsNetwork Security
Botnets have in recent times, become a very major challenge in the cyberspace. The Global Internet has experienced tremendous attacks designed mainly to disable internet infrastructure on one hand, while in most other cases people and... more
    • by 
    •   3  
      Cyber SecurityBotnet Detection AlgorithmsBotnet Detection
The Internet or World Wide Web has become prominent platform for business and commerce and is witnessing user growth with increased penetration of mobile Internet. Huge traffic is being generated, some of it being legitimate and the rest... more
    • by 
    •   14  
      Computer MalwareMalwareDeceptionMalware Detection
This paper presents network behavioral features of botnets that can be used to accomplish accurate malware detection. By analyzing and comparing known malware and normal processes, we have successfully exploited differences in their... more
    • by 
    •   5  
      Machine LearningData MiningComputer SecurityBotnet
Abstract: A novel algorithm for the detection of underwater man-made objects in forward-looking sonar imagery is proposed. The algorithm takes advantage of the integral-image representation to quickly compute features, and progressively... more
    • by 
    •   2  
      Botnet Detection AlgorithmsForward-looking Sonar
A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the... more
    • by 
    •   8  
      Machine LearningFeature SelectionDistance MeasuresBotnet Detection Algorithms
    • by 
    •   9  
      Computer ScienceMachine LearningNetwork SecurityComputer Networks