Now showing items 1-2 of 2

    • Generating content-based signatures for detecting bot-infected machines 

      Bilge, Leyla (Bilkent University, 2008)
      A botnet is a network of compromised machines that are remotely controlled and commanded by an attacker, who is often called the botmaster. Such botnets are often abused as platforms to launch distributed denial of service ...
    • Preventing unauthorized data flows 

      Uzun, Emre; Parlato, G.; Atluri, V.; Ferrara, A. L.; Vaidya, J.; Sural, S.; Lorenzi, D. (Springer, Cham, 2017)
      Trojan Horse attacks can lead to unauthorized data flows and can cause either a confidentiality violation or an integrity violation. Existing solutions to address this problem employ analysis techniques that keep track of ...