1 |
Zhu Z S , Lu G H , Chen Y . Botnet research survey. Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, Turku, 2008: 967~972
|
2 |
Damballa G O . Botnet communication topologies:understanding the intricacies of Botnet command-and-control.
|
3 |
Kanich C , Kreibich C , Levchenko K ,et al. An empirical analysis of spam marketing conversion. Proceedings of the 15th ACM Conference on Computer and Communications Security,ACM, New York,NY,USA, 2008: 3~14
|
4 |
Calvet J , Davis C R , Fermandez J M ,et al. The case for in-the-lab Botnet experimentation:creating and taking down a 3000-node Botnet. Proceedings of the 26th Annual Computer Security Applications Conference(ACSAC'10), New York,NY,USA, 2010: 141~150
|
5 |
Benzel T , Braden R , KIM D ,et al. Testbeds and research infrastructures for the development of networks and communities. Proceedings of the 2nd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, Barcelona, 2006: 10~30
|
6 |
Dagon D , Gu G F , Lee C P ,et al. A taxonomy of botnet structures. Proceedings of Twenty-Third Annual Computer Security Applications Conference, Seoul,Korea, 2007: 325~339
|
7 |
Ruan L , Xiao L M , Zhu M F . Content addressable storage optimization for desktop virtualization based disaster backup storage system. China Communications, 2012,9(7): 1~13
|
8 |
Jackson A W , Lapsley D , Jones C ,et al. SLINGbot:a system for live investigation of next generation botnets. Proceedings of IEEE Conference for Homeland Security,Cybersecurity Applications and Technology, Washington,DC,USA, 2009: 313~318
|
9 |
Ruan L , Wang H X , Xiao L M ,et al. Memory virtualization for MIPS processor based cloud server. Advances in Grid and Pervasive Computing, 2012(7296): 54~63
|
10 |
蔺波 . 基于虚拟机的僵尸网络仿真平台的研究与实现. 北京航空航天大学硕士学位论文 , 2012
|