您当前的位置:
首页 >
文章列表页 >
Using coverage analysis to extract Botnet command-and-control protocol
Academic communication | 更新时间:2024-06-05
    • Using coverage analysis to extract Botnet command-and-control protocol

    • Journal on Communications   Vol. 35, Issue 1, Pages: 156-166(2014)
    • DOI:10.3969/j.issn.1000-436x.2014.01.018    

      CLC: TP393.08
    • Online First:2014-01

      Published:25 January 2014

    移动端阅览

  • Zhi WANG, Ya-yun CAI, Lu LIU, et al. Using coverage analysis to extract Botnet command-and-control protocol[J]. Journal on Communications, 2014, 35(1): 156-166. DOI: 10.3969/j.issn.1000-436x.2014.01.018.

  •  
  •  

0

Views

1171

下载量

5

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Botnet detection based on generative adversarial network
BotCatcher:botnet detection system based on deep learning
Modeling and countermeasures of a social network-based botnet with strong destroy-resistance
Research on Webshell-based botnet
Progress in research on active network flow watermark

Related Author

Yongkang JIANG
Lin WANG
Yue TAN
Futai ZOU
Qixu LIU
Xiang CUI
Binxing FANG
Di WU

Related Institution

School of Cyber Science and Engineering, Shanghai Jiao Tong University
School of Cyberspace Security, Beijing University of Posts and Telecommunications
Institute of Electronic and Information Engineering of UESTC in Guangdong
Institute of Information Engineering, Chinese Academy of Sciences
School of Cyber Security, University of Chinese Academy of Sciences
0