Title&col=t">↑&col=t">↓Author&col=a">↑&col=a">↓Type&col=pt">↑&col=pt">↓Year&col=y">↑&col=y">↓LangSize&col=s">↑&col=s">↓linkCommentSourceUpload&col=u">↑&col=u">↓Tags
Malicious Software (Malware): A Security Threat to the Internet EconomyOECDpdf2008en1.69 MB40724457.pdfMinisterial Background Report DSTI/ICCP/REG(2007)5/FINALhttp://www.oecd.org/dataoecd/53/...2009-06-21Security Spam Malware Virus Trojan Botnet OECD honeyblog
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm WormThorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, Felix Freilingpdf2008en592.29 Kstorm-leet08.pdffound on http://honeyblog.orghttp://honeyblog.org/junkyard/pa...2009-06-21Security Spam Malware Virus Trojan Botnet Storm Worm honeyblog
Characterizing the IRC-based Botnet PhenomenonJianwei Zhuge, Thorsten Holz, Xinhui Han, Jinpeng Guo, Wei Zoupdf2007en329.52 Kbotnet-china-TR.pdffound on http://honeyblog.orghttp://honeyblog.org/junkyard/re...2009-06-21Security Malware Virus Trojan Botnet honeyblog IRC
Botnets - The Silent ThreatDavid Barrosopdf2007en413.57 Kenisa_pp_botnets.pdffound on http://honeyblog.orghttp://www.enisa.europa.eu/doc/p...2009-06-21Security Malware Virus Trojan Botnet honeyblog ENISA