Limpar
3 resultados

Acesso aberto

Tipo do recurso

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Artigo

Abiola Abimbola, David Gresty, Qi Shi,

... In this paper we introduce the Trojan Horse SubSeven, its capabilities and influence over intrusion detection systems. A Honey Pot program is implemented, simulating the SubSeven Server. The Honey Pot Program provides feedback and stores data to and from the SubSeven’s client.

Tópico(s): Artificial Immune Systems Applications

2002 - Elsevier BV | Network Security

Artigo Revisado por pares

Chen Ning-jun,

... and using method of the Trojan horse called SubSeven from the two aspects of server and control ...

Tópico(s): Advanced Malware Detection Techniques

2008 - Elsevier BV | Computers & Security

Artigo Revisado por pares

Muhamad Arif Hashim, Iman Hazwam Abd Halim, Mohammad Hafiz Ismail, Norfaizalfarid Mohd Noor, Mohd Faris Mohd Fuzi, Abdul Hapes Mohammed, Ray Adderley JM Gining,

... to investigate other Trojan attacks such as Zeus, SubSeven or Back Orifice by using the same digital ...

Tópico(s): Digital Media Forensic Detection

2017 - | Journal of Computing Research and Innovation