Contents
Academic literature on the topic 'Command-and-Control (C2) Servers'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Command-and-Control (C2) Servers.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Command-and-Control (C2) Servers"
Radunovic, Vladimir, and Mladen Veinovic. "Malware command and control over social media: Towards the server-less infrastructure." Serbian Journal of Electrical Engineering 17, no. 3 (2020): 357–75. http://dx.doi.org/10.2298/sjee2003357r.
Full textUmar, Rusydi, Imam Riadi, and Ridho Surya Kusuma. "Analysis of Conti Ransomware Attack on Computer Network with Live Forensic Method." IJID (International Journal on Informatics for Development) 10, no. 1 (2021): 53–61. http://dx.doi.org/10.14421/ijid.2021.2423.
Full textSyeda, Durre Zehra, and Mamoona Naveed Asghar. "Dynamic Malware Classification and API Categorisation of Windows Portable Executable Files Using Machine Learning." Applied Sciences 14, no. 3 (2024): 1015. http://dx.doi.org/10.3390/app14031015.
Full textChatzoglou, Efstratios, and Georgios Kambourakis. "C3: Leveraging the Native Messaging Application Programming Interface for Covert Command and Control." Future Internet 17, no. 4 (2025): 172. https://doi.org/10.3390/fi17040172.
Full textHarini, Mrs K. "Command and Control Traffic Detection and Mitigation in Botnet Driven Networks." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 1038–43. https://doi.org/10.22214/ijraset.2025.67486.
Full textBerman, Daniel S. "DGA CapsNet: 1D Application of Capsule Networks to DGA Detection." Information 10, no. 5 (2019): 157. http://dx.doi.org/10.3390/info10050157.
Full textTopçu, Okan, and Levent Yilmaz. "Rapid prototyping of cognitive agent simulations using C-BML transformations." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 17, no. 2 (2019): 155–73. http://dx.doi.org/10.1177/1548512919860222.
Full textObriadin, V., S. Horielyshev, and О. Bondarenko. "PROBLEM QUESTIONS OF CREATION AND USE OF AUTOMATED EDUCATIONAL COMMAND POST IN THE EDUCATIONAL PROCESS OF HIGHER EDUCATIONAL INSTITUTIONS." Scientific journal of the National Academy of National Guard "Honor and Law" 2, no. 85 (2023): 36–44. http://dx.doi.org/10.33405/2078-7480/2023/2/85/282531.
Full textDekate, Aman, Dev Mulchandani, Sampada Wazalwar, Chinmay Rahangdale, Gaurav Choudhari, and Swati Tiwari. "Development of Command and Control Server (C2 Server)." International Journal of Innovative Science and Research Technology, May 14, 2025, 3456–62. https://doi.org/10.38124/ijisrt/25apr1891.
Full textOSTAP, Hubert, and Ryszard ANTKIEWICZ. "BotTROP: Detection of a Botnet-based Threat using Novel Data Mining Algorithm." Communications of the IBIMA, February 8, 2022, 1–21. http://dx.doi.org/10.5171/2022.156851.
Full textDissertations / Theses on the topic "Command-and-Control (C2) Servers"
Nakamura, Yuki, and Björn Åström. "Scanning and Host Fingerprinting Methods for Command and Control Server Detection." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21768.
Full text