↓ Skip to main content

Research in Attacks, Intrusions, and Defenses

Overview of attention for book
Cover of 'Research in Attacks, Intrusions, and Defenses'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Ensemble Learning for Low-Level Hardware-Supported Malware Detection
  3. Altmetric Badge
    Chapter 2 Physical-Layer Detection of Hardware Keyloggers
  4. Altmetric Badge
    Chapter 3 Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters
  5. Altmetric Badge
    Chapter 4 Hardware-Assisted Fine-Grained Code-Reuse Attack Detection
  6. Altmetric Badge
    Chapter 5 Haetae: Scaling the Performance of Network Intrusion Detection with Many-Core Processors
  7. Altmetric Badge
    Chapter 6 Demystifying the IP Blackspace
  8. Altmetric Badge
    Chapter 7 Providing Dynamic Control to Passive Network Security Monitoring
  9. Altmetric Badge
    Chapter 8 Probabilistic Inference on Integrity for Access Behavior Based Malware Detection
  10. Altmetric Badge
    Chapter 9 Counteracting Data-Only Malware with Code Pointer Examination
  11. Altmetric Badge
    Chapter 10 Xede: Practical Exploit Early Detection
  12. Altmetric Badge
    Chapter 11 Preventing Exploits in Microsoft Office Documents Through Content Randomization
  13. Altmetric Badge
    Chapter 12 Improving Accuracy of Static Integer Overflow Detection in Binary
  14. Altmetric Badge
    Chapter 13 A Formal Framework for Program Anomaly Detection
  15. Altmetric Badge
    Chapter 14 jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications
  16. Altmetric Badge
    Chapter 15 WYSISNWIV: What You Scan Is Not What I Visit
  17. Altmetric Badge
    Chapter 16 SDN Rootkits: Subverting Network Operating Systems of Software-Defined Networks
  18. Altmetric Badge
    Chapter 17 AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware
  19. Altmetric Badge
    Chapter 18 HelDroid: Dissecting and Detecting Mobile Ransomware
  20. Altmetric Badge
    Chapter 19 Continuous Authentication on Mobile Devices Using Power Consumption, Touch Gestures and Physical Movement of Users
  21. Altmetric Badge
    Chapter 20 Privacy Risk Assessment on Online Photos
  22. Altmetric Badge
    Chapter 21 Privacy is Not an Option: Attacking the IPv6 Privacy Extension
  23. Altmetric Badge
    Chapter 22 Evaluation of Intrusion Detection Systems in Virtualized Environments Using Attack Injection
  24. Altmetric Badge
    Chapter 23 Security Analysis of PHP Bytecode Protection Mechanisms
  25. Altmetric Badge
    Chapter 24 Radmin: Early Detection of Application-Level Resource Exhaustion and Starvation Attacks
  26. Altmetric Badge
    Chapter 25 Towards Automatic Inference of Kernel Object Semantics from Binary Code
  27. Altmetric Badge
    Chapter 26 $$\textsc {BotWatcher}$$
  28. Altmetric Badge
    Chapter 27 Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud Hosting
  29. Altmetric Badge
    Chapter 28 AmpPot: Monitoring and Defending Against Amplification DDoS Attacks
Attention for Chapter 26: $$\textsc {BotWatcher}$$
Altmetric Badge

Mentioned by

twitter
2 X users

Citations

dimensions_citation
8 Dimensions

Readers on

mendeley
12 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
$$\textsc {BotWatcher}$$
Chapter number 26
Book title
Research in Attacks, Intrusions, and Defenses
Published by
Springer, Cham, November 2015
DOI 10.1007/978-3-319-26362-5_26
Book ISBNs
978-3-31-926361-8, 978-3-31-926362-5
Authors

Thomas Barabosch, Adrian Dombeck, Khaled Yakdan, Elmar Gerhards-Padilla

X Demographics

X Demographics

The data shown below were collected from the profiles of 2 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 12 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 12 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 4 33%
Researcher 3 25%
Other 1 8%
Unspecified 1 8%
Student > Master 1 8%
Other 1 8%
Unknown 1 8%
Readers by discipline Count As %
Computer Science 8 67%
Unspecified 1 8%
Medicine and Dentistry 1 8%
Engineering 1 8%
Unknown 1 8%