-
1
-
-
42149135845
-
-
th, 2007.
-
th, 2007.
-
-
-
-
4
-
-
42149131919
-
Catching spam before it arrives: Domain specific dynamic blacklists
-
Darlinghurst, Australia, Australia
-
D. Cook, J. Hartnett, K. Manderson, and J. Scanlan. Catching spam before it arrives: domain specific dynamic blacklists. In ACSW Frontiers '06: Proceedings of the 2006 Australasian workshops on Grid computing and e-research, Darlinghurst, Australia, Australia, 2006.
-
(2006)
ACSW Frontiers '06: Proceedings of the 2006 Australasian workshops on Grid computing and e-research
-
-
Cook, D.1
Hartnett, J.2
Manderson, K.3
Scanlan, J.4
-
6
-
-
42149166487
-
-
C. Gates, J. McNutt, J. Kadane, and M. Kellner. Detecting scans at the ISP level. Technical Report CMU/SEI-2006-TR-005, Software Engineering Institute, 2006.
-
C. Gates, J. McNutt, J. Kadane, and M. Kellner. Detecting scans at the ISP level. Technical Report CMU/SEI-2006-TR-005, Software Engineering Institute, 2006.
-
-
-
-
7
-
-
34547284915
-
Scan detection on very large networks using logistic regression modeling
-
Washington, DC, USA
-
C. Gates, J. McNutt, J. Kadane, and M. Kellner. Scan detection on very large networks using logistic regression modeling. In ISCC '06: Proceedings of the 11th IEEE Symposium on Computers and Communications, Washington, DC, USA, 2006.
-
(2006)
ISCC '06: Proceedings of the 11th IEEE Symposium on Computers and Communications
-
-
Gates, C.1
McNutt, J.2
Kadane, J.3
Kellner, M.4
-
11
-
-
3543096392
-
Fast Portscan Detection Using Sequential Hypothesis Testing
-
Oakland, CA, May
-
J. Jung, V. Paxson, A. Berger, and H. Balakrishnan. Fast Portscan Detection Using Sequential Hypothesis Testing. In IEEE Symposium on Security and Privacy 2004, Oakland, CA, May 2004.
-
(2004)
IEEE Symposium on Security and Privacy 2004
-
-
Jung, J.1
Paxson, V.2
Berger, A.3
Balakrishnan, H.4
-
13
-
-
33947198115
-
Observed structure of addresses in IP traffic
-
E. Kohler, J. Li, V. Paxson, and S. Shenker. Observed structure of addresses in IP traffic. IEEE/ACM Transactions on Networking, 14(6), 2006.
-
(2006)
IEEE/ACM Transactions on Networking
, vol.14
, Issue.6
-
-
Kohler, E.1
Li, J.2
Paxson, V.3
Shenker, S.4
-
16
-
-
3042826619
-
The making of a spam zombie army: Dissecting the sobig worms
-
E. Levy. The making of a spam zombie army: Dissecting the sobig worms. IEEE Security and Privacy, 1(4), 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.4
-
-
Levy, E.1
-
17
-
-
17644414542
-
Locality: A new paradigm for thinking about normal behavior and outsider threat
-
Ascona, Switzerland, August 18-21
-
John McHugh and Carrie Gates. Locality: A new paradigm for thinking about normal behavior and outsider threat. In Proceedings of the 2003 New Security Paradigms Workshop, Ascona, Switzerland, 2003. August 18-21, 2003.
-
(2003)
Proceedings of the 2003 New Security Paradigms Workshop
-
-
McHugh, J.1
Gates, C.2
-
18
-
-
84904888755
-
Attacking DDoS at the source
-
Washington, DC, USA
-
J. Mirkovic, G. Prier, and P. Reiher. Attacking DDoS at the source. In ICNP '02: Proceedings of the 10th IEEE International Conference on Network Protocols, Washington, DC, USA, 2002.
-
(2002)
ICNP '02: Proceedings of the 10th IEEE International Conference on Network Protocols
-
-
Mirkovic, J.1
Prier, G.2
Reiher, P.3
-
19
-
-
26844469335
-
Protection mechanisms against phishing attacks
-
Proceedings of the second annual conference on Trust, Privacy and Security in Digital Business, of, August
-
K. Plößl, H. Federrath, and T. Nowey. Protection mechanisms against phishing attacks. In Proceedings of the second annual conference on Trust, Privacy and Security in Digital Business, volume 3592 of Lecture Notes in Computer Science, August 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3592
-
-
Plößl, K.1
Federrath, H.2
Nowey, T.3
-
20
-
-
42149099768
-
-
th, 2007.
-
th, 2007.
-
-
-
-
23
-
-
42149194821
-
-
Bleeding Edge Threats. Bleeding snort ruleset. Available at http://www.bleedingsnort.com/index. php/about-bleeding-edge-threats/ all-bleeding-edge-threats-signatures/, Fetched on January 29th, 2007.
-
Bleeding Edge Threats. Bleeding snort ruleset. Available at http://www.bleedingsnort.com/index. php/about-bleeding-edge-threats/ all-bleeding-edge-threats-signatures/, Fetched on January 29th, 2007.
-
-
-
-
24
-
-
42149111251
-
Agencies feel botnets' light footprint
-
January
-
P. Walt. Agencies feel botnets' light footprint. Government Computer News, January 2007.
-
(2007)
Government Computer News
-
-
Walt, P.1
|