Author of the publication

Sybil attacks as a mitigation strategy against the Storm botnet.

, , , and . MALWARE, page 32-40. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sybil attacks as a mitigation strategy against the Storm botnet., , , and . MALWARE, page 32-40. IEEE Computer Society, (2008)Optimising sybil attacks against P2P-based botnets., , and . MALWARE, page 78-87. IEEE Computer Society, (2009)Methodology for a Field Study of Anti-malware Software., , , , and . Financial Cryptography Workshops, volume 7398 of Lecture Notes in Computer Science, page 80-85. Springer, (2012)A certificate revocation scheme for wireless ad hoc networks., and . SASN, page 54-61. ACM, (2003)The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet, , , , , , , and . Annual Computer Security Applications Conference, page .. Austin, Texas États-Unis, (Dec 6, 2010)A Secure MANET Routing Protocol with Resilience against Byzantine Behaviours of Malicious or Selfish Nodes., , and . AINA Workshops (2), page 19-26. IEEE Computer Society, (2007)Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?., , , , and . ESORICS, volume 5283 of Lecture Notes in Computer Science, page 461-480. Springer, (2008)