Skip to Main Content
Skip Nav Destination
ASME Press Select Proceedings
International Conference on Computer and Electrical Engineering 4th (ICCEE 2011)Available to Purchase
By
Jianhong Zhou
Jianhong Zhou
Search for other works by this author on:
ISBN:
9780791859841
No. of Pages:
698
Publisher:
ASME Press
Publication date:
2011

Communication, sharing information have historically been primarily motivators for studying about criminal activity including identity theft, phishing, spam that involving botnets which they are little programs that infected user without any user intervention. The probability of being infected depends on vulnerability in victim's computer, lack of layered security, lack of user awareness. There is a lot of paper that represent problem and detection methods, but the area of study is vast, hence this paper is deduced based on reviewed papers about this topic and clarified some problems and existing common solutions in a simple classification.

Abstract
Keywords
1 Introduction
2 Related Works
3 Analysis and Summary
4 Conclusions
References
This content is only available via PDF.
You do not currently have access to this chapter.

or Create an Account

Close Modal
Close Modal