Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IRC protocol
biblio
Botnet Homology Method Based on Symbolic Approximation Algorithm of Communication Characteristic Curve
Submitted by grigby1 on Fri, 04/05/2019 - 10:23am
pattern clustering
internet
invasive software
IP networks
IRC botnet
IRC protocol
Metrics
most significant botnet group
multiple zombies hosts
network servers
network traffic
packet capture traffic monitoring
homology
Protocols
pubcrawl
resilience
Resiliency
Servers
symbolic approximation algorithm
telecommunication traffic
time series
Time series analysis
time warp simulation
Compositionality
botnet
botnet client
botnet control server
botnet homology method
botnets
clustering
Clustering algorithms
command and control systems
command control channels
command interaction
communication characteristic curve
Approximation algorithms
computational complexity
computer network security
dynamic network communication characteristic curves
dynamic time warping distance clustering
earliest botnet group
effective detection method
extracted curve
Heuristic algorithms
homogenous botnet
homologous botnets
biblio
Real-Time IRC Threat Detection Framework
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
Metrics
WannaCry ransomware attack
tools
Stanford coreNLP
social networking (online)
social media platforms
security of data
Scalability
Resiliency
real-time threat detection
real-time text communications
real-time systems
real-time IRC threat detection framework
pubcrawl
Neural networks
Monitoring
Autonomic Security
malicious IRC behavior analysis
IRC protocol
IRC channel monitoring
Internet Relay Chat protocol
Internet Relay Chat (IRC)
internet
hacker data analysis and visualization
hacker community
electronic messaging
Data collection
cyber security
Computer hacking
Computer crime
autonomic threat detection