Visualizing and Modeling the Scanning Behavior of the Conficker Botnet in the Presence of User and Network Activity

R. Weaver. Visualizing and Modeling the Scanning Behavior of the Conficker Botnet in the Presence of User and Network Activity. IEEE Transactions on Information Forensics and Security, 10(5):1039-1051, 2015. [doi]

Authors

R. Weaver

This author has not been identified. Look up 'R. Weaver' in Google