Visualizing and Modeling the Scanning Behavior of the Conficker Botnet in the Presence of User and Network Activity

R. Weaver. Visualizing and Modeling the Scanning Behavior of the Conficker Botnet in the Presence of User and Network Activity. IEEE Transactions on Information Forensics and Security, 10(5):1039-1051, 2015. [doi]

Abstract

Abstract is missing.