Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet260/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   256   257   258   259   260   261   262   263   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

257
 
References
Kaspersky Security Bulletin, 2013. Kaspersky Lab Global Research and Analysis Team.
Lanelli, N., Hackworth, A., 2005. CERT Coordination Center, Carnegie Mellon University. . 
Botnets as a Vehicle for Online Crime, 
http://www.cert.org/archive/pdf/Botnets.pdf
(ac-
cessed 01.12.05).
Leder, F., Werner, T., Martini, P., 2009. Institute of Computer Science IV, University of Bonn, 
Germany, 2009. In: Proactive Botnet Countermeasures—An Offensive Approach. NATO 
Cooperative Cyber Defence Centre of Excellence—Cyber Warfare Conference, 17–19 
June 2009.
Lemos, R., 2010. MIT Technology Review—Computing, “Rise of the Point-and-Click 
Botnet”, February 23, 2010.
Neville, A., Gibb, R. Symantec White Paper. ZeroAccess Indepth, 4 October 2013.
Paganini, P., 2013a. InfoSec Institute, Botnets and cybercrime – Introduction. 
http://resources.
infosecinstitute.com/botnets-and-cybercrime-introduction/
(published 08.04.13).
Paganini, P., 2013b. InfoSec Institute, Botnets, how do they work? Architectures and case 
studies – Part 2. 
http://resources.infosecinstitute.com/botnets-how-do-they-work-architec-
tures-and-case-studies-part-2/
(published 22.04.13).
Paganini, P., 2013c. InfoSec Institute, Botnets and Cybercrime – Botnets hunting – Part 3. 
http://resources.infosecinstitute.com/botnets-and-cybercrime-botnets-hunting-part-3/
(published 25.04.13).
Rossow C., 2013. Inst. for Internet Security, Gelsenkirchen, Germany; Andriesse, D., Werner, 
T., Stone-Gross, B., Plohmann, D., Dietrich, C.J., Bos, H. SoK: P2PWNED – Modeling 
and Evaluating the Resilience of Peer-to-Peer Botnets, published in IEEE Symposium on 
Security and Privacy (SP), 19–22 May 2013, Berkeley, CA.
Symantec Internet Security Threat Report 2013: Volume 18, April 2013.
Wang, P.; Sch. of Electr. Eng. & Comput. Sci., Univ. of Central Florida, Orlando, FL, USA; 
Wu, L., Aslam, B., Zou, C.C., 2013. A Systematic Study on Peer-to-Peer Botnets, pub-
lished in Proceedings of 18th International Conference on Computer Communications and 
Networks, 2009. ICCCN 2009, 3–6 August 2009, San Francisco, CA.
Wyke, J., 2011. Sophos White Paper, What is Zeus?, May 2011.
Zhu, Z.S., Yegneswaran, V., Chen, Y.; Department of Electrical and Computer Engineering, 
Northwestern University, Computer Science Laboratory, SRI International, 2009. Using 
Failure Information Analysis to Detect Enterprise Zombies, published in 5th International 
ICST Conference on Security and Privacy in Communication Networks. SecureComm, 
14–17 September 2009, Athens, Greece.



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   256   257   258   259   260   261   262   263   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish