<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.net.informatik.uni-goettingen.de/index.php?action=history&amp;feed=atom&amp;title=Malware_Analysis_and_Detection</id>
	<title>Malware Analysis and Detection - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.net.informatik.uni-goettingen.de/index.php?action=history&amp;feed=atom&amp;title=Malware_Analysis_and_Detection"/>
	<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Malware_Analysis_and_Detection&amp;action=history"/>
	<updated>2026-05-18T04:21:44Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.8</generator>
	<entry>
		<id>https://wiki.net.informatik.uni-goettingen.de/index.php?title=Malware_Analysis_and_Detection&amp;diff=1385&amp;oldid=prev</id>
		<title>Ftegele1: Created page with &quot;== Details == {{Project Description |supervisor=[http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler] |duration=3-6 months |type=Bachelor/Master/Pr...&quot;</title>
		<link rel="alternate" type="text/html" href="https://wiki.net.informatik.uni-goettingen.de/index.php?title=Malware_Analysis_and_Detection&amp;diff=1385&amp;oldid=prev"/>
		<updated>2011-10-24T09:59:14Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;== Details == {{Project Description |supervisor=[http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler] |duration=3-6 months |type=Bachelor/Master/Pr...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== Details ==&lt;br /&gt;
{{Project Description&lt;br /&gt;
|supervisor=[http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]&lt;br /&gt;
|duration=3-6 months&lt;br /&gt;
|type=Bachelor/Master/Project&lt;br /&gt;
|status=open&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
Malware detection is a difficult and challenging task, especially on the network level. Leveraging command and control communication of bots and the pattern of communication, we try to identify bots without looking into the packet content. If you would like to join this work, please get in contact with us and depending on your experience and educational level, we will check out how you can participate!&lt;/div&gt;</summary>
		<author><name>Ftegele1</name></author>
	</entry>
</feed>