Search Results
- Articles
- Books & Media
- Our Website
- Collection Guides
- Archival Materials
ArticlesSee all articles results »
From journals and magazines
-
Botnet Communication Patterns
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEB6qJz34qmC1Sg69adpks-lmoRS0WEQQXxXxFLK7E3qQVmz6_93ZJMWiiLccdsPwZfbxTWa-Aehw1Lli_dzPFIVuAiN9ZZmWH4Z5kCmRGW0oNPCa3L6xx6dkPGrAxaoWBhFd8hl26dH9yzdzvaRQWS8hASwqmt4QMihrtepdl1saEdRFMYHsje7vnieUuSW6lndJztnaweM6qfzYft2ZMt6F19oal1DdLRNKytDCWqZ1Ldn4X8P3YKe6ZnqXpV_sQwNnB7D9TXywCZ3BdHg1L2ZYDHrTobdWKeI9ONnN2eIQXsbXk9GNX_VM8DWTceGz0CitmWF9DDUXGcnlSZEbbixzUfa6hSTwh4YnSshYmJwFecR51Dc6lhrz6Ag8y5DCRAiFWRRzhUZab2NoFy6JhWndb0FYI5nqSkmcGlq8p45RBDJ16KeEflqh34Lz1ZyPUkfjz9FNAnE1ssKvBe36g6XVUlukxKm4iKxxx7_POoEtencZN2nDZvG5xNOy98OZ86EvllrGKg
Ieee Communications Surveys And Tutorials, Volume 19, Issue 4, pp. 2768 - 2796
Journal Article : Full Text Online
-
N-BaIoT-Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3dS8MwEA_TJ33wG5xOyYNv2q0fcWlgDDZ1qOBQmYpPpUmu-CDrcN3_713TDgcivrX0Etpc0txdfvc7xs4EmEyH3cxLNYVufKs8jZ6WFwSZn2qZWmMpNPAW37-HT8_x6KrBLpa5MABQgs-gTZflWb7NzYJCZZ1YKLJI1tiaVL7L1VqeGKDfoBw3KtWV6cZ1goyvOg-Pz68E4orbfhR1pYyClU2orKqy-isOq_1ltM3e6jcrwdVtBy5xYYYV1HVN3_jfj9hhW5XJyQdujuyyBkz32OYPIsJ9Nhl7w_Qun3hjhwrHuzlYfg1FidSa8jzj-Jj3PvrDvJhC0et89PmgKChDn5ewAxSGGR8sipyoMQkefcBeRjeTq1uvqrfgGTTbCk-jt5AJK0HYS5xgQWZ8BcpogTaP0Wj3CWtTqaUhEi-JKz-2aaiNzUIBURaF0SHj6F0FsZQa0uhSaLAKOwoBFz0RjRnTbbKgHvnEVCzkVAzjMym9EV8lpK2EtJXU2mqy82WbmePg-FN6nwZ9KVmNd5O1agUn1TKdJ7hvo7-q0Kk6-r3VMdugzh0-t8XWi68FnLi6Eafl_PsGzgjZIQ
Ieee Pervasive Computing, Volume 17, Issue 3, pp. 12 - 22
Journal Article : Full Text Online
-
An empirical comparison of botnet detection methods
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3fa9swEBalT4XSrj-gabugwt6KG9uSbWmUQpotjL11K4w9CUmWaMrmhMb9_3dnyYY8NA_do-0ztnSnu5P06TtCPnFnvclLn2iDSzdpLRMDM60ky3yqTaVrW-PSwC_x_Xf-8EPMZztk1p-FQVhl9P3Bp3feOt6ZxN6crBaLyc8OQI90JxwThRwZPyGbQMuef7kfdhIgnRYDvzdIx4MzAeOFmHCEd_HA3pm9FZz2V3oNXeZDrYtNt81iLJofkqZvRQfEvglAlLAksYHQ7qke_7PBH8hBzFrpNMgdkR3XHJPDviIEjQ7ihHyeNtT9XS063hFqhxqHdOnp7dOdWbaNa28nT3e0dm0HAmtoqGG9PiWP86-Ps29JrM6QWF6KNmEwYL3XMvWstK50hRfGSqZxqw7mKXVliryoPefcGiE1y7120oEhGOEzrtkZoTAVy0RVGadZwY2rJZh17sBDICuZteWIZL06lI2U5Vg544_qsWnPClWoUIUqLRSocESuh3dWgbBjq3TRa1ltaEFBRNn63njDJIZP5aLEFFyMyGVvIyp6hbXCGk0VF6XkI3I1PIbxjJs0unHLV5ApIQGrGE_ZNpmqkkJCrDp_5_9fkD28CmC5S7Lbvry6j6EexrgbP_8A_nIkPA
Computers & Security, Volume 45, pp. 100 - 123
Journal Article : Full Text Online
Books & MediaSee all books & media results »
Books, music, movies and more
-
Botnet detection : countering the largest security threat
https://find.library.duke.edu/catalog/DUKE003951053
Book
Check Holdings for this item's availability Perkins & Bostock Library, QA76.9.A25 B68 2008
-
Botnet road map status update.
https://find.library.duke.edu/catalog/UNCb10673634
Book, Government publication : View Online
-
Virtual honeypots : from botnet tracking to intrusion detection
https://find.library.duke.edu/catalog/DUKE99119315889008501
Book : View Online
Collection Guides
Detailed inventories of archival collections
Some materials and descriptions may include offensive content. More info