-
1
-
-
48649088747
-
-
Pidgin. http://pidgin.im/, 2007.
-
(2007)
Pidgin
-
-
-
2
-
-
0036349136
-
On Distinguishing Between Internet Power Law Topology Generators
-
New York, NY, June
-
T. Bu and D. Towsley. On Distinguishing Between Internet Power Law Topology Generators. In Proceedings of the 2002 IEEE INFOCOM, pages 638-647, New York, NY, June 2002.
-
(2002)
Proceedings of the 2002 IEEE INFOCOM
, pp. 638-647
-
-
Bu, T.1
Towsley, D.2
-
4
-
-
48649100871
-
-
M. Hicks. Reuters suspends im service due to kelvir worm. http://www.eweek.com/article2/0,1759,1786151,00.asp, Apri 2005.
-
M. Hicks. Reuters suspends im service due to kelvir worm. http://www.eweek.com/article2/0,1759,1786151,00.asp, Apri 2005.
-
-
-
-
6
-
-
48649097012
-
-
IBM. Lotus Sametime. http://www-142.ibm.com/software/sw-lotus/sametime.
-
Sametime
-
-
-
9
-
-
18144370814
-
Instant messaging: A new target for hackers
-
July
-
N. Leavitt. Instant messaging: A new target for hackers. Computer, 38(7):20-23, July 2005.
-
(2005)
Computer
, vol.38
, Issue.7
, pp. 20-23
-
-
Leavitt, N.1
-
11
-
-
48649097468
-
Defending against instant messaging worms
-
San Francisco, CA, Nov
-
Z. Liu, G. Shu, N. Li, , and D. Lee. Defending against instant messaging worms. In Proceedings of IEEE GLOBECOM 2006, pages 1-6, San Francisco, CA, Nov. 2006.
-
(2006)
Proceedings of IEEE GLOBECOM
, pp. 1-6
-
-
Liu, Z.1
Shu, G.2
Li, N.3
Lee, D.4
-
12
-
-
31844440531
-
Secure Public Instant Messaging: A Survey
-
Fredericton, NB, Canada
-
M. Mannan and P. C. van Oorschot. Secure Public Instant Messaging: A Survey. In Proceedings of the 2nd Annual Conference on Privacy, Security, and Trust, pages 69-77, Fredericton, NB, Canada, 2004.
-
(2004)
Proceedings of the 2nd Annual Conference on Privacy, Security, and Trust
, pp. 69-77
-
-
Mannan, M.1
van Oorschot, P.C.2
-
13
-
-
31844456208
-
On Instant Messaging Worms, Analysis and Countermeasures
-
Fairfax, VA, Nov
-
M. Mannan and P. C. van Oorschot. On Instant Messaging Worms, Analysis and Countermeasures. In Proceedings of WORM 2005, pages 2-11, Fairfax, VA, Nov. 2005.
-
(2005)
Proceedings of WORM
, pp. 2-11
-
-
Mannan, M.1
van Oorschot, P.C.2
-
15
-
-
34848915641
-
The Structure of An Instant Messenger Network and Its Vulnerability to Malicious Codes
-
Philadelphia, PA, Aug
-
C. D. Morse and H. Wang. The Structure of An Instant Messenger Network and Its Vulnerability to Malicious Codes. In Proceedings of ACM SIGCOMM 2005 Poster Session, Philadelphia, PA, Aug. 2005.
-
(2005)
Proceedings of ACM SIGCOMM 2005 Poster Session
-
-
Morse, C.D.1
Wang, H.2
-
17
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
San Diego, CA, Feb
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proceedings of the 12th NDSS, San Diego, CA, Feb. 2005.
-
(2005)
Proceedings of the 12th NDSS
-
-
Newsome, J.1
Song, D.2
-
19
-
-
33750325871
-
Argos: An emulator for fingerprinting zeroday attacks
-
Leuven, Belgium, April
-
G. Portokalidis, A. Slowinska, and H. Bos. Argos: an emulator for fingerprinting zeroday attacks. In Proceedings of the EUROSYS 2006, Leuven, Belgium, April 2006.
-
(2006)
Proceedings of the EUROSYS 2006
-
-
Portokalidis, G.1
Slowinska, A.2
Bos, H.3
-
20
-
-
48649095257
-
-
October 2006
-
C. Raiu. The IM worms armada. http://www.viruslist.com/en/weblog? weblogid=203678309, October 2006.
-
The IM worms armada
-
-
Raiu, C.1
-
25
-
-
84855752748
-
-
Sophos. Troj/Kelvir-M. http://www.sophos.com/virusinfo/analyses/ trojkelvirm.html.
-
Troj/Kelvir-M
-
-
-
26
-
-
48649100115
-
-
Sophos. W32/Jitux-A. http://www.sophos.com/virusinfo/analyses/w32jituxa. html.
-
Sophos. W32/Jitux-A
-
-
-
27
-
-
48649087130
-
-
Sophos. W32/Kelvir-F. http://www.sophos.com/virusinfo/analyses/ w32kelvirf.html.
-
Sophos. W32/Kelvir-F
-
-
-
28
-
-
48649087130
-
-
Sophos. W32/Kelvir-Q. http://www.sophos.com/virusinfo/analyses/ w32kelvirq.html.
-
Sophos. W32/Kelvir-Q
-
-
-
30
-
-
0012109964
-
-
The Honeynet Project, 2nd Edition, Addison-Wesley Professional, May
-
The Honeynet Project. Know Your Enemy: Learning about Security Threats (2nd Edition). Addison-Wesley Professional, May 2004.
-
(2004)
Know Your Enemy: Learning about Security Threats
-
-
-
31
-
-
85035794100
-
Analyzing Network and Content Characteristics of Spim Using Honeypots
-
Santa Clara, CA, June
-
A. J. Trivedi, P. Q. Judge, and S. Krasser. Analyzing Network and Content Characteristics of Spim Using Honeypots. In Proceedings of the 3rd USENIX SRUTI, Santa Clara, CA, June 2007.
-
(2007)
Proceedings of the 3rd USENIX SRUTI
-
-
Trivedi, A.J.1
Judge, P.Q.2
Krasser, S.3
-
32
-
-
84904088330
-
Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
-
San Diego, CA, Feb
-
Y.-M. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. King. Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities. In Proceedings of the 13th NDSS, San Diego, CA, Feb. 2006.
-
(2006)
Proceedings of the 13th NDSS
-
-
Wang, Y.-M.1
Beck, D.2
Jiang, X.3
Roussev, R.4
Verbowski, C.5
Chen, S.6
King, S.7
-
33
-
-
34848860968
-
Virus throttling for instant messaging
-
Technical report, HP Lab Bristol, May
-
M. M. Williamson, A. Parry, and A. Byde. Virus throttling for instant messaging. Technical report, HP Lab Bristol, May 2004.
-
(2004)
-
-
Williamson, M.M.1
Parry, A.2
Byde, A.3
-
34
-
-
34848889285
-
Understanding Instant Messaging Traffic Characteristics
-
Toronto, Canada, June
-
Z. Xiao, L. Guo, and J. Tracey. Understanding Instant Messaging Traffic Characteristics. In Proceedings of the 27th ICDCS, Toronto, Canada, June 2007.
-
(2007)
Proceedings of the 27th ICDCS
-
-
Xiao, Z.1
Guo, L.2
Tracey, J.3
-
35
-
-
34248995311
-
Modeling and Simulation Study of the Propagation and Defense of Internet Email Worm
-
April-June
-
C. C. Zou, D. Towsley, and W. Gong. Modeling and Simulation Study of the Propagation and Defense of Internet Email Worm. IEEE Transactions on Dependable and Secure Computing, 4(2):105-118, April-June 2007.
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.2
, pp. 105-118
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
|