نتایج جستجو برای: internet relay chat irc

تعداد نتایج: 200592  

2011
Zesheng Chen Chao Chen

Internet epidemics are malicious software that can self-propagate across the Internet, i.e., compromise vulnerable hosts and use them to attack other victims. Since the early stage of the Internet, epidemics have caused enormous damages and been a significant security threat. For example, the Morris worm infected 10% of all hosts in the Internet in 1988; the Code Red worm compromised at least 3...

Journal: :Comput. J. 2014
Monowar H. Bhuyan Hirak Kashyap Dhruba Kumar Bhattacharyya Jugal K. Kalita

The minimal processing and best-e↵ort forwarding of any packet, malicious or not, was the prime concern when the Internet was designed. This architecture creates an unregulated network path, which can be exploited by any cyber attacker motivated by revenge, prestige, politics or money. Denial-of-service (DoS) attacks exploit this to target critical Web services [1, 2, 3, 4, 5]. This type of att...

Journal: :Zona proxima 2022

Este artículo tiene como finalidad presentar el Internet Relay Chat herramienta de innovación educativa, con gran potencial didáctico para uso la educación a distancia y construcción gestión del conocimiento. Uno los objetivos enseñanza es formar personas que sepan reconocer fenómenos ocurren su alrededor objeto adquirir nuevos aprendizajes. La educativa permite estructurar grupos colaborativos...

2016
Pratibha Rathore Ashish

Defence against Vampire attacks is one of the primary concerns on the Internet today. Vampire attacks are difficult to prevent because of the open, interconnected nature of the Internet and its underlying protocols, which can be used in several ways to deny service. Attackers hide their identity by using third parties such as private chat channels on IRC (Internet Relay Chat). They also insert ...

Journal: :Inf. Soc. 2004
James M. Hudson Amy Bruckman

In this article we present an empirical study aimed at better understanding the potential for harm when conducting research in chatrooms. For this study, we entered IRC chatrooms on the ICQ network and posted one of three messages to tell participants that we were recording them: a recording message, an opt-in message, or an opt-out message. In the fourth condition, we entered the chatroom but ...

2007
Paul Barford Vinod Yegneswaran

The continued growth and diversification of the Internet has been accompanied by an increasing prevalence of attacks and intrusions [40]. It can be argued, however, that a significant change in motivation for malicious activity has taken place over the past several years: from vandalism and recognition in the hacker community, to attacks and intrusions for financial gain. This shift has been ma...

Journal: :I. J. Network Security 2015
Muhammad Mahmoud Manjinder Nir Ashraf Matrawy

Botnets are known to be one of the most serious Internet security threats. In this survey, we review botnet architectures and their controlling mechanisms. Botnet infection behavior is explained. Then, known botnet models are outlined to study botnet design. Furthermore, Fast-Flux Service Networks (FFSN) are discussed in great details as they play an important role in facilitating botnet traffi...

Journal: :Computers in Human Behavior 2007
Beatriz Lia Avila Mileham

Internet chat rooms have introduced unprecedented dynamics into marital relationships: never in history has it been so easy to enjoy both the stability of marriage and the thrills of the dating scene at the same time. This study examined the phenomenon of online infidelity in chat rooms, a process whereby individuals involved in a long-term committed relationship seek computer synchronous, inte...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید