Silva, 2019 - Google Patents
Mitigating botnets: Regulatory solutions for industry intervention in large-scale cybercrimeSilva, 2019
View PDF- Document ID
- 6085619475605064920
- Author
- Silva K
- Publication year
External Links
Snippet
What if the Internet community could halt cyber-attacks as they happen? Would that improve our response to cybercrime? Would such an intervention be not only desirable but also legitimate? In this thesis, I investigate the regulatory boundaries of strengthening private …
- 230000001105 regulatory effect 0 title abstract description 201
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sabillon et al. | Cybercrime and cybercriminals: A comprehensive study | |
Huang et al. | Framing dependencies introduced by underground commoditization | |
Purkait | Phishing counter measures and their effectiveness–literature review | |
Subrahmanian et al. | The global cyber-vulnerability report | |
Shakarian et al. | Exploring malicious hacker forums | |
Broadhurst et al. | Malware trends on ‘darknet’crypto-markets: Research review | |
Easttom et al. | Computer crime, investigation, and the law | |
Wilner et al. | On the social science of ransomware: Technology, security, and society | |
Broadhurst | Cybercrime: Thieves, swindlers, bandits, and privateers in cyberspace | |
Goutam | Cybersecurity Fundamentals: Understand the Role of Cybersecurity, Its Importance and Modern Techniques Used by Cybersecurity Professionals (English Edition) | |
Jakobsson | The death of the internet | |
Acharya et al. | The imitation game: Exploring brand impersonation attacks on social media platforms | |
Senecal | The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet | |
Karamagi | A review of factors affecting the effectiveness of phishing | |
Stringhini | Adversarial behaviours knowledge area | |
Tiirmaa-Klaar et al. | Botnets | |
Silva | Mitigating botnets: Regulatory solutions for industry intervention in large-scale cybercrime | |
Morris | The future of netcrime now: Part 1–threats and challenges | |
Frumento et al. | The role of Social Engineering in evolution of attacks | |
Maurushat et al. | Artificial intelligence enabled cyber fraud: a detailed look into payment diversion fraud and ransomware | |
Sirohi | Transformational Dimensions of Cyber Crime | |
De Fusco | Advanced C2 Fingerprinting | |
ThreatLab | Zscaler threatlabz 2023 phishing report | |
Thomas | The role of the underground economy in social network spam and abuse | |
Gernhardt | Vulnerability assessment of the Croatian cyberspace to information warfare campaign via means of malicious websites comments |