-
1
-
-
85081770459
-
The Internet Motion Sensor: A Distributed Blackhole Monitoring System
-
M. Bailey, E. Cooke, F. Jahanian, J. Nazario, and D. Watson, "The Internet Motion Sensor: A Distributed Blackhole Monitoring System," The 12th Annual Network and Distributed System Security Symposium (NDSS05), 2005.
-
(2005)
The 12th Annual Network and Distributed System Security Symposium (NDSS05)
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Nazario, J.4
Watson, D.5
-
3
-
-
51249114041
-
-
SANS Internet Storm Center
-
SANS Internet Storm Center, http://isc.sans.org/.
-
-
-
-
6
-
-
51249096698
-
-
Korea Internet Security Center KISC
-
Korea Internet Security Center (KISC), http://www.krcert.net/english/ main.htm.
-
-
-
-
7
-
-
51249089171
-
-
JPCERT/CC Internet Scan Data Acquisition System (ISDAS), http://www.jpcert.or.jp/isdas/.
-
JPCERT/CC Internet Scan Data Acquisition System (ISDAS), http://www.jpcert.or.jp/isdas/.
-
-
-
-
8
-
-
51249108571
-
-
@police, http://www.cyberpolice.go.jp/detect/observation.html.
-
@police, http://www.cyberpolice.go.jp/detect/observation.html.
-
-
-
-
9
-
-
51249091359
-
-
WCLSCAN
-
WCLSCAN, http://www.wclscan.org/.
-
-
-
-
10
-
-
51249104601
-
-
IT Security Center, Information-Technology Promotion Agency
-
IT Security Center, Information-Technology Promotion Agency, Japan, http://www.ipa.go.jp/security/.
-
-
-
-
11
-
-
51249112698
-
-
Telecom-ISAC Japan
-
Telecom-ISAC Japan, https://www.telecom-isac.jp/.
-
-
-
-
12
-
-
51249112473
-
nicter: An Incident Analysis System using Correlation between Network Monitoring and Malware Analysis
-
K. Nakao, K. Yoshioka, D. Inoue, M. Eto, and K. Rikitake, "nicter: An Incident Analysis System using Correlation between Network Monitoring and Malware Analysis," The 1st Joint Workshop on Information Security (JWIS06), pp. 363-377, 2006.
-
(2006)
The 1st Joint Workshop on Information Security (JWIS06)
, pp. 363-377
-
-
Nakao, K.1
Yoshioka, K.2
Inoue, D.3
Eto, M.4
Rikitake, K.5
-
13
-
-
51249111229
-
A Novel Concept of Network Incident Analysis based on Multi-layer Observations of Malware Activities
-
K. Nakao, K. Yoshioka, D. Inoue, and M. Eto, "A Novel Concept of Network Incident Analysis based on Multi-layer Observations of Malware Activities," The 2nd Joint Workshop on Information Security (JWIS07), pp. 267-279, 2007.
-
(2007)
The 2nd Joint Workshop on Information Security (JWIS07)
, pp. 267-279
-
-
Nakao, K.1
Yoshioka, K.2
Inoue, D.3
Eto, M.4
-
14
-
-
34047110218
-
Toward Automated Dynamic Malware Analysis Using CWSandbox
-
C. Willems, T. Holz, and F. Freiling, "Toward Automated Dynamic Malware Analysis Using CWSandbox," Security & Privacy Magazine, IEEE, Volume 5, Issue 2, pp. 32-39, 2007. http://www.cwsandbox.org/.
-
(2007)
Security & Privacy Magazine, IEEE
, vol.5
, Issue.2
, pp. 32-39
-
-
Willems, C.1
Holz, T.2
Freiling, F.3
-
15
-
-
51249086809
-
-
Anubis, http://analysis.seclab.tuwien.ac.at/.
-
Anubis
-
-
-
17
-
-
85063636742
-
QEMU, a Fast and Portable Dynamic Translator
-
F. Bellard, "QEMU, a Fast and Portable Dynamic Translator," 2005 USENIX Annual Technical Conference, FREENIX Track, pp 41-46, 2005.
-
(2005)
2005 USENIX Annual Technical Conference, FREENIX Track
, pp. 41-46
-
-
Bellard, F.1
-
18
-
-
51249123028
-
-
NORMAN Sandbox Information Center
-
NORMAN Sandbox Information Center, http://www.norman.com/microsites/nsic/ .
-
-
-
-
19
-
-
84868352734
-
Capture - A Behavioral Analysis Tool for Applications and Documents
-
C. Seifert, R. Steenson, I. Welch, P. Komisarczuk, and B. Endicott-Popovsky, "Capture - A Behavioral Analysis Tool for Applications and Documents," 7th Annual Digital Forensic Research Workshop (DFRWS), 2007.
-
(2007)
7th Annual Digital Forensic Research Workshop (DFRWS)
-
-
Seifert, C.1
Steenson, R.2
Welch, I.3
Komisarczuk, P.4
Endicott-Popovsky, B.5
-
20
-
-
51249122791
-
-
Joebox, http://www.joebox.org/.
-
Joebox
-
-
-
21
-
-
34047153756
-
Hooking Windows API - Technics of Hooking API Functions on Windows
-
Holy Father, "Hooking Windows API - Technics of Hooking API Functions on Windows," CodeBreakers Journal, Vol. 1, No. 2, 2004.
-
(2004)
CodeBreakers Journal
, vol.1
, Issue.2
-
-
Father, H.1
-
22
-
-
33750376598
-
The Nepenthes Platform: An Efficient Approach to Collect Malware
-
P. Baecher, M. Koetter, T. Holz, M. Dornseif, and F. C. Freiling, "The Nepenthes Platform: An Efficient Approach to Collect Malware," 9th International Symposium on Recent Advances in Intrusion Detection (RAID 2006), pp. 165-184, 2006.
-
(2006)
9th International Symposium on Recent Advances in Intrusion Detection (RAID
, pp. 165-184
-
-
Baecher, P.1
Koetter, M.2
Holz, T.3
Dornseif, M.4
Freiling, F.C.5
|