1.
A Novel Technology of P2P Botnet Detection
一种新颖的P2P僵尸网络检测技术
2.
P2P Botnet Control Strategy Based on Social Network Analysis
一种基于社会网络分析的P2P僵尸网络反制策略
3.
Research on Network Security against Botnets
面向网络安全的关于僵尸网络的研究
4.
At the end of the paper, how to control and response BotNet is presented.
最后,提出了僵尸网络的应对方法。
5.
IRC Botnet Detection Based on Host Behavior
基于终端行为特征的IRC僵尸网络检测
6.
Bot_CODA:botnet collaborative detection architecture
Bot_CODA:僵尸网络协同检测体系结构
7.
A SYN Flood Variation Attack Detection Model in Botnet
僵尸网络中的变种SYN Flood攻击检测模型
8.
Research and development of Botnet based on computer network operations
基于计算机网络对抗的僵尸网络研究与进展
9.
The Threats to Network Security by Botnet and the Countermeasures
僵尸网络对互联网安全的威胁和治理措施
10.
The Research and Implement of Controlled Bonnets Attacks Experimental Platform
受控僵尸网络攻击实验平台的研究与实现
11.
The Crimes of Leasing and Scalping "Corpse Networks"
关于出租、倒卖“僵尸网络”行为的入罪化思路
12.
Tree Botnet and design of Botnet detecting program based on feature
树状僵尸网络及其特征检测方案的设计
13.
Cybercriminals rent out use of their botnets on the black market.
网络罪犯们在黑市上出租他们的僵尸网络的使用权。
14.
Sara: Cynthia, how many hours have you been online? You look like a zombie!
莎拉:辛西亚,你挂在网络上多久了?你看起来活像个僵尸!
15.
Building BotNet Based on the Distributed Computing Platform
基于分布式计算平台构建僵尸网络参考方案及可行性分析
16.
Such botnets can be created, or simply rented from cyber-criminals.
“僵尸网络”可以被创建出来,或者可以直接从网络罪犯那里租借过来使用。
17.
A botnet is a network of compromised machines that can be remotely controlled by an attacker.
僵尸网络是一个可以由攻击者远程控制的已被攻陷主机组成的网络。
18.
With the help of honeynets we can observe the people who run botnets- a task that is difficult using other techniques.
在蜜网的帮助下,我们可以观察运行僵尸网络的那些人-于其他工具来说这是一个很艰难的任务。