J Hamilton, S Danicic - 2012 28th IEEE International …, 2012 - ieeexplore.ieee.org
The concept of community structure arises from the analysis of social networks in sociology. Community structure can be found in many real world graphs other than social networks …
YD Mane - 2017 8th International Conference on Computing …, 2017 - ieeexplore.ieee.org
At Present, the most genuine exhibit of cutting edge malware is botnet. Botnet is across the board malware and it emerges usually in today's digital wrongdoing, which brings about …
YD Mane, UP Khot - … Conference on Smart City and Emerging …, 2018 - ieeexplore.ieee.org
BotMaster have recently targeted their attention to low latency anonymous communication ie The Onion Router (Tor) to provide mysterious communication to command and control …
J Wang, Y Chen - … 2nd International Symposium on Advances in …, 2017 - atlantis-press.com
P2P data transmission is the mainstream of network data transmission. P2P botnet malicious data is hidden in normal transmit data, not only difficult to detect but also could cause great …