@dblp

Extracting probable command and control signatures for detecting botnets.

, , , and . SAC, page 1657-1662. ACM, (2014)

Links and resources

Tags