Gespeichert in:
Weitere beteiligte Personen: | , , , |
---|---|
Format: | Buch |
Sprache: | Englisch |
Veröffentlicht: |
Boca Raton ; London ; New York
CRC Press
[2019]
|
Schriftenreihe: | CRC series in security, privacy and trust
|
Schlagwörter: | |
Links: | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=031598458&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
Beschreibung: | Hier auch später erschienene, unveränderte Nachdrucke |
Umfang: | xii, 426 Seiten Illustrationen |
ISBN: | 9780367191542 9781032401133 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV046219768 | ||
003 | DE-604 | ||
005 | 20240313 | ||
007 | t| | ||
008 | 191029s2019 xx a||| |||| 00||| eng d | ||
020 | |a 9780367191542 |9 978-0-367-19154-2 | ||
020 | |a 9781032401133 |9 978-1-03-240113-3 | ||
035 | |a (OCoLC)1130268878 | ||
035 | |a (DE-599)HBZHT020242432 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-739 |a DE-11 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a Botnets |b architectures, countermeasures, and challenges |c edited by Georgios Kambourakis, Marios Anagnostopoulos, Weizhi Meng, Peng Zhou |
264 | 1 | |a Boca Raton ; London ; New York |b CRC Press |c [2019] | |
264 | 4 | |c © 2019 | |
300 | |a xii, 426 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a CRC series in security, privacy and trust | |
500 | |a Hier auch später erschienene, unveränderte Nachdrucke | ||
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Kambourakis, Georgios |0 (DE-588)1048022315 |4 edt | |
700 | 1 | |a Anagnostopoulos, Marios |4 edt | |
700 | 1 | |a Meng, Weizhi |d 1986- |0 (DE-588)1202716857 |4 edt | |
700 | 1 | |a Zhou, Peng |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-0-429-32991-3 |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=031598458&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-031598458 |
Datensatz im Suchindex
_version_ | 1829009569251065856 |
---|---|
adam_text |
Contents Preface.vii About the Editors. ix Contributors. .xi 1 Botnet Architectures: A State-of-the-Art Review. 1 BASHEER AL-DUWAIR AND MOATH JARRAH 2 IoT Botnets: The Journey So Far and the Road Ahead. 33 PASCAL GEENENS 3 IoT Botnet Traits and Techniques: A View of the State of the Art. 101 PASCAL GEENENS 4 Advanced Information Hiding Techniques for Modern Botnets. 165 LUCA CAVIGLIONE, WOJCIECH MAZURCZYK, AND STEFFEN WENDZEL 5 Steganography Techniques for Command and Control (C2) Channels. 189 JEDRZEJ BIENIASZ AND KRZYSZTOF SZCZYPIORSKI 6 Blockchain-Based Botnets for Command-and-Control Resilience . 217 WEIZHI WANG AND XIAOBO MA 7 Detecting Botnets and Unknown Network Attacks in Big Traffic Data. 237 LUIS SACRAMENTO, IBÉRIA MEDEIROS, JOÃO BOTA, AND MIGUEL CORREIA 8 Domain Generation Algorithm Detection Techniques through Network Analysis and Machine Learning. 269 FEDERICA BISIO, SALVATORE SAELI, AND DANILO MASSA V
v! ■ Contents 9 Identifying IoT-Based Botnets: A Microservice Architecture for IoT Management and Security.293 THARUN KAMMARA AND MELODY MOH 10 Understanding and Detecting Social Botnet.327 YUEDE JI AND QIANG LI 11 Use of Botnets for Mining Cryptocurrencies. 359 RENITA MURIMI 12 Time to Diverge the Botnet Revenues from Criminal Wallet?.387 GIOVANNI BOTTAZZI, GIANLUIGI ME, PIERLUIGI PERRONE, AND GIUSEPPE GIULIO RUTIGLIANO Index.403 |
any_adam_object | 1 |
author2 | Kambourakis, Georgios Anagnostopoulos, Marios Meng, Weizhi 1986- Zhou, Peng |
author2_role | edt edt edt edt |
author2_variant | g k gk m a ma w m wm p z pz |
author_GND | (DE-588)1048022315 (DE-588)1202716857 |
author_facet | Kambourakis, Georgios Anagnostopoulos, Marios Meng, Weizhi 1986- Zhou, Peng |
building | Verbundindex |
bvnumber | BV046219768 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)1130268878 (DE-599)HBZHT020242432 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV046219768</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240313</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">191029s2019 xx a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780367191542</subfield><subfield code="9">978-0-367-19154-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781032401133</subfield><subfield code="9">978-1-03-240113-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1130268878</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)HBZHT020242432</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Botnets</subfield><subfield code="b">architectures, countermeasures, and challenges</subfield><subfield code="c">edited by Georgios Kambourakis, Marios Anagnostopoulos, Weizhi Meng, Peng Zhou</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton ; London ; New York</subfield><subfield code="b">CRC Press</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xii, 426 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">CRC series in security, privacy and trust</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Hier auch später erschienene, unveränderte Nachdrucke</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kambourakis, Georgios</subfield><subfield code="0">(DE-588)1048022315</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Anagnostopoulos, Marios</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Meng, Weizhi</subfield><subfield code="d">1986-</subfield><subfield code="0">(DE-588)1202716857</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhou, Peng</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-0-429-32991-3</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=031598458&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031598458</subfield></datafield></record></collection> |
id | DE-604.BV046219768 |
illustrated | Illustrated |
indexdate | 2025-04-10T10:04:10Z |
institution | BVB |
isbn | 9780367191542 9781032401133 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031598458 |
oclc_num | 1130268878 |
open_access_boolean | |
owner | DE-739 DE-11 |
owner_facet | DE-739 DE-11 |
physical | xii, 426 Seiten Illustrationen |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | CRC Press |
record_format | marc |
series2 | CRC series in security, privacy and trust |
spelling | Botnets architectures, countermeasures, and challenges edited by Georgios Kambourakis, Marios Anagnostopoulos, Weizhi Meng, Peng Zhou Boca Raton ; London ; New York CRC Press [2019] © 2019 xii, 426 Seiten Illustrationen txt rdacontent n rdamedia nc rdacarrier CRC series in security, privacy and trust Hier auch später erschienene, unveränderte Nachdrucke Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s DE-604 Kambourakis, Georgios (DE-588)1048022315 edt Anagnostopoulos, Marios edt Meng, Weizhi 1986- (DE-588)1202716857 edt Zhou, Peng edt Erscheint auch als Online-Ausgabe 978-0-429-32991-3 Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=031598458&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Botnets architectures, countermeasures, and challenges Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4274324-2 |
title | Botnets architectures, countermeasures, and challenges |
title_auth | Botnets architectures, countermeasures, and challenges |
title_exact_search | Botnets architectures, countermeasures, and challenges |
title_full | Botnets architectures, countermeasures, and challenges edited by Georgios Kambourakis, Marios Anagnostopoulos, Weizhi Meng, Peng Zhou |
title_fullStr | Botnets architectures, countermeasures, and challenges edited by Georgios Kambourakis, Marios Anagnostopoulos, Weizhi Meng, Peng Zhou |
title_full_unstemmed | Botnets architectures, countermeasures, and challenges edited by Georgios Kambourakis, Marios Anagnostopoulos, Weizhi Meng, Peng Zhou |
title_short | Botnets |
title_sort | botnets architectures countermeasures and challenges |
title_sub | architectures, countermeasures, and challenges |
topic | Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=031598458&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT kambourakisgeorgios botnetsarchitecturescountermeasuresandchallenges AT anagnostopoulosmarios botnetsarchitecturescountermeasuresandchallenges AT mengweizhi botnetsarchitecturescountermeasuresandchallenges AT zhoupeng botnetsarchitecturescountermeasuresandchallenges |