Sciweavers

8658 search results - page 7 / 1732
» Models of Command and Control
Sort
View
DIMVA
2010
13 years 9 months ago
Evaluating Bluetooth as a Medium for Botnet Command and Control
Abstract. Malware targeting mobile phones is being studied with increasing interest by the research community. While such attention has previously focused on viruses and worms, man...
Kapil Singh, Samrit Sangal, Nehil Jain, Patrick Tr...
ACSAC
2009
IEEE
14 years 2 months ago
Active Botnet Probing to Identify Obscure Command and Control Channels
Guofei Gu, Vinod Yegneswaran, Phillip A. Porras, J...
HICSS
2006
IEEE
83views Biometrics» more  HICSS 2006»
14 years 1 months ago
Vigilance and Error Detection in an Automated Command and Control Environment
This study focused on improving vigilance performance through developing methods to arouse subjects to the possibility of errors in a data manipulation information warfare attack....
David P. Biros, Kent Marett, Brent T. Langhals
IAW
2003
IEEE
14 years 29 days ago
Security Vulnerabilities in Command and Control Interoperability
- This paper will outline issues associated with communication system interoperability, the security vulnerabilities associated with improved interoperability, network simulation t...
John A. Hamilton Jr.