Journal
IEEE SECURITY & PRIVACY
Volume 14, Issue 4, Pages 46-53Publisher
IEEE COMPUTER SOC
DOI: 10.1109/MSP.2016.76
Keywords
-
Ask authors/readers for more resources
Attackers are using domain-generation algorithms (DGAs) and command-and-control operations to effciently distribute malware. A detailed taxonomy of DGAs highlights this problem in depth, improving our understanding of various attack techniques and their existing and potential trends.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available