-
1
-
-
85080711655
-
The Ghost in the Browser: Analysis of Web-based Malware
-
April
-
Niels Provos, Dean McNamee, Panayiotis Mavrommatis, Ke Wang, and Nagendra Modadugu, "The Ghost in the Browser: Analysis of Web-based Malware," First Workshop on Hot Topics in Understanding Botnets (HotBots 2007), April 2007.
-
(2007)
First Workshop on Hot Topics in Understanding Botnets (HotBots
-
-
Provos, N.1
McNamee, D.2
Mavrommatis, P.3
Wang, K.4
Modadugu, N.5
-
2
-
-
23344441723
-
Spyware: A Little Knowledge is a Wonderful Thing
-
New York, Aug
-
M. B. Schmidt, and K. P. Arnett, "Spyware: A Little Knowledge is a Wonderful Thing," Communications of the ACM, New York, Vol. 48, Iss. 8, p. 67-70, Aug., 2005.
-
(2005)
Communications of the ACM
, vol.48
, Issue.ISS. 8
, pp. 67-70
-
-
Schmidt, M.B.1
Arnett, K.P.2
-
5
-
-
33845399252
-
Spyware be Gone
-
New York, March
-
W. Aaron, "Spyware be Gone," NetWorker, New York, Vol.9, Iss. 1,p. 18, March 2005.
-
(2005)
NetWorker
, vol.9
, Issue.ISS. 1
, pp. 18
-
-
Aaron, W.1
-
6
-
-
85077681170
-
A Crawler-based Study of Spyware on the Web
-
San Diego, CA, February
-
Alexander Moshchuk, Tanya Bragin, Steven D. Gribble, and Henry M. Levy, "A Crawler-based Study of Spyware on the Web," In Proceedings of the Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2006.
-
(2006)
Proceedings of the Annual Network and Distributed System Security Symposium (NDSS)
-
-
Moshchuk, A.1
Bragin, T.2
Gribble, S.D.3
Levy, H.M.4
-
7
-
-
84904088330
-
Automated Web Patrol with Strider HoneyMonkeys
-
February 2006. Also see
-
Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev, Chad Verbowski, Shuo Chen, and Sam King, "Automated Web Patrol with Strider HoneyMonkeys," In Proceedings of the 2006 Network and Distributed System Security Symposium, p 35-49, February 2006. Also see http://research.microsoft. com/HoneyMonkey/
-
Proceedings of the 2006 Network and Distributed System Security Symposium
, pp. 35-49
-
-
Wang, Y.-M.1
Beck, D.2
Jiang, X.3
Roussev, R.4
Verbowski, C.5
Chen, S.6
King, S.7
-
8
-
-
23344444212
-
Is Spyware an Internet Nuisance or Public Menace
-
New York, Aug
-
Q. Hu, and T. Dinev, "Is Spyware an Internet Nuisance or Public Menace," Communications of the ACM, New York, Vol. 48, Iss. 8, p. 61-66, Aug., 2005
-
(2005)
Communications of the ACM
, vol.48
, Issue.ISS. 8
, pp. 61-66
-
-
Hu, Q.1
Dinev, T.2
-
9
-
-
9144256106
-
Understanding spyware: Risk and response
-
Sep.-Oct
-
W. Ames, "Understanding spyware: risk and response," IEEE IT Professional, Vol. 6, Iss. 5, p. 25-29, Sep.-Oct., 2004.
-
(2004)
IEEE IT Professional
, vol.6
, Issue.ISS. 5
, pp. 25-29
-
-
Ames, W.1
-
10
-
-
40349106306
-
A Stateful Approach to Spyware Detection and Removal
-
Ming-Wei Wu, Yennun Huang, Yi-Min Wang, Sy-Yen Kuo, "A Stateful Approach to Spyware Detection and Removal," In Proceedings of the 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06), p. 173-182, 2006
-
(2006)
Proceedings of the 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)
, pp. 173-182
-
-
Wu, M.-W.1
Huang, Y.2
Wang, Y.-M.3
Kuo, S.-Y.4
-
11
-
-
79960164190
-
Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEP) for Spyware Management
-
November
-
Yi-Min Wang, Roussi Roussev, Chad Verbowski, Aaron Johnson, Ming-Wei Wu, Yennun Huang, and Sy-Yen Kuo, "Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEP) for Spyware Management," In Proceedings of the 18th Large Installation System Administrations (LISA'04), p. 33-46, November 2004.
-
(2004)
Proceedings of the 18th Large Installation System Administrations (LISA'04)
, pp. 33-46
-
-
Wang, Y.-M.1
Roussev, R.2
Verbowski, C.3
Johnson, A.4
Wu, M.-W.5
Huang, Y.6
Kuo, S.-Y.7
-
12
-
-
85077680022
-
Behavior-based Spyware Detection
-
August
-
Engin Kirda, Christopher Kruegel, Greg Banks, Giovanni Vigna, and Richard A. Kemmerer, "Behavior-based Spyware Detection," In Proceedings of the 15th USENIX Security Symposium, p. 273-288, August 2006.
-
(2006)
Proceedings of the 15th USENIX Security Symposium
, pp. 273-288
-
-
Kirda, E.1
Kruegel, C.2
Banks, G.3
Vigna, G.4
Kemmerer, R.A.5
-
13
-
-
0027699087
-
Lattice-Based Access Control Models
-
R. S. Sandhu, "Lattice-Based Access Control Models," IEEE Computer, 26(11), p. 9-19, 1993.
-
(1993)
IEEE Computer
, vol.26
, Issue.11
, pp. 9-19
-
-
Sandhu, R.S.1
|