-
2
-
-
38549139786
-
-
Tech Rep 641, Indiana Univ, Bloomington, IN
-
Stamm S, Ramzan Z, Jakobsson M (2006) Drive-by Pharming. (Tech Rep 641, Indiana Univ, Bloomington, IN).
-
(2006)
Drive-by Pharming
-
-
Stamm, S.1
Ramzan, Z.2
Jakobsson, M.3
-
3
-
-
60849099128
-
-
Tech Rep, Next Generation Security Software Ltd, Sutton, UK
-
Ollmann G (2006) The Pharming Guide. (Tech Rep, Next Generation Security Software Ltd., Sutton, UK).
-
(2006)
The Pharming Guide
-
-
Ollmann, G.1
-
5
-
-
84947612643
-
Proximity breeds danger: Emerging threads in metro-area wireless networks
-
USENIX, Berkeley, CA, pp
-
Akritidis P, Chin WY, Lam VT, Sidiroglou S, Anagnostakis KG (2007) Proximity breeds danger: Emerging threads in metro-area wireless networks. Proc 16th USENIX Security Symposium (USENIX, Berkeley, CA), pp 323-338.
-
(2007)
Proc 16th USENIX Security Symposium
, pp. 323-338
-
-
Akritidis, P.1
Chin, W.Y.2
Lam, V.T.3
Sidiroglou, S.4
Anagnostakis, K.G.5
-
6
-
-
60849114100
-
Practice and prevention of home-router mid-stream injection attacks
-
IEEE, Washington, DC, in press
-
Myers S, Stamm S (2008) Practice and prevention of home-router mid-stream injection attacks. IEEE Proc Anti-Phishing Working Group eCrime Research Summit, 2008, IEEE, Washington, DC), in press.
-
(2008)
IEEE Proc Anti-Phishing Working Group eCrime Research Summit, 2008
-
-
Myers, S.1
Stamm, S.2
-
7
-
-
60849127070
-
-
TraynorP,ButlerK,EnckW,BordersK,McDaniel P(2006)Malnets:Large- ScaleMalicious Networks via Compromised Wireless Access Points. (Tech Rep NAS-TR-0048-2006, Network and Security Research Center,Pennsylvania State Univ,State College,PA).
-
TraynorP,ButlerK,EnckW,BordersK,McDaniel P(2006)Malnets:Large- ScaleMalicious Networks via Compromised Wireless Access Points. (Tech Rep NAS-TR-0048-2006, Network and Security Research Center,Pennsylvania State Univ,State College,PA).
-
-
-
-
9
-
-
33751038485
-
The final nail in WEP's coffin
-
IEEE Comput Soc Washington, DC, pp
-
Bittau A, Handley M, Lackey J (2006) The final nail in WEP's coffin. SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (IEEE Comput Soc Washington, DC), pp 386-400.
-
(2006)
SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy
, pp. 386-400
-
-
Bittau, A.1
Handley, M.2
Lackey, J.3
-
10
-
-
41349109716
-
Random geometric graphs
-
Dall J, Christensen M (2002) Random geometric graphs. Phys Rev E 66:016121-016130.
-
(2002)
Phys Rev E
, vol.66
, pp. 016121-016130
-
-
Dall, J.1
Christensen, M.2
-
11
-
-
45849155231
-
Giant clusters in random ad hoc networks
-
Nemeth G, Vattay G (2003) Giant clusters in random ad hoc networks. Phys Rev E 67:036110-036116.
-
(2003)
Phys Rev E
, vol.67
, pp. 036110-036116
-
-
Nemeth, G.1
Vattay, G.2
-
12
-
-
37649029119
-
Connectivity distribution of spatial networks
-
Herrmann C, Barthélemy M, Provero P (2003) Connectivity distribution of spatial networks. Phys Rev E 68:026128-026134.
-
(2003)
Phys Rev E
, vol.68
, pp. 026128-026134
-
-
Herrmann, C.1
Barthélemy, M.2
Provero, P.3
-
13
-
-
0242332739
-
Small worlds in wireless networks
-
Helmy A (2003) Small worlds in wireless networks. IEEE Comm Lett 7:490-492.
-
(2003)
IEEE Comm Lett
, vol.7
, pp. 490-492
-
-
Helmy, A.1
-
14
-
-
84990671447
-
A critical point for random graphs with a given degree sequence
-
Molloy M, Reed B (1995) A critical point for random graphs with a given degree sequence. Random Struct Algorithm 6:161-179.
-
(1995)
Random Struct Algorithm
, vol.6
, pp. 161-179
-
-
Molloy, M.1
Reed, B.2
-
17
-
-
0040231044
-
Foiling the Cracker: A Survey of, and Improvements to, Password Security
-
USENIX, Berkeley, CA, pp
-
Klein DV (1990) Foiling the Cracker: A Survey of, and Improvements to, Password Security. Proc Second USENIX Workshop on Security (USENIX, Berkeley, CA), pp 5-14.
-
(1990)
Proc Second USENIX Workshop on Security
, pp. 5-14
-
-
Klein, D.V.1
-
18
-
-
60849135216
-
-
Jeff J, Alan Y, Ross B, Alasdair A (2000) The Memorability and Security of Passwords-Some Empirical Results. (Tech Rep No. 500, Computer Laboratory, Univ of Cambridge, Cambridge, UK).
-
Jeff J, Alan Y, Ross B, Alasdair A (2000) The Memorability and Security of Passwords-Some Empirical Results. (Tech Rep No. 500, Computer Laboratory, Univ of Cambridge, Cambridge, UK).
-
-
-
-
21
-
-
0035794256
-
Epidemic spreading in scale-free networks
-
Pastor-Satorras R, Vespignani A (2001) Epidemic spreading in scale-free networks. Phys Rev Lett 86:3200-3203.
-
(2001)
Phys Rev Lett
, vol.86
, pp. 3200-3203
-
-
Pastor-Satorras, R.1
Vespignani, A.2
-
23
-
-
0032482432
-
Collective dynamics of ''small-world'' networks
-
Watts DJ, Strogatz SH (1998) Collective dynamics of ''small-world'' networks. Nature 393:440-442.
-
(1998)
Nature
, vol.393
, pp. 440-442
-
-
Watts, D.J.1
Strogatz, S.H.2
-
24
-
-
0038483826
-
Emergence of scaling in random networks
-
Barabási AL, Albert R (1999) Emergence of scaling in random networks. Science 286:509-512.
-
(1999)
Science
, vol.286
, pp. 509-512
-
-
Barabási, A.L.1
Albert, R.2
-
25
-
-
0033594451
-
The effects of local spatial structure on epidemiological invasions
-
Keeling MJ (1999) The effects of local spatial structure on epidemiological invasions. Proc R Soc London Ser B 266:859-867.
-
(1999)
Proc R Soc London Ser B
, vol.266
, pp. 859-867
-
-
Keeling, M.J.1
-
26
-
-
0034186340
-
Epidemics and percolation in small-world networks
-
Moore C, Newman MEJ (2000) Epidemics and percolation in small-world networks Phys Rev E 61:5678-5682.
-
(2000)
Phys Rev E
, vol.61
, pp. 5678-5682
-
-
Moore, C.1
Newman, M.E.J.2
-
27
-
-
0020737985
-
Critical behavior of the general epidemic process and dynamical percolation
-
Grassberger P (1983) Critical behavior of the general epidemic process and dynamical percolation. Math Biosci 63:157.
-
(1983)
Math Biosci
, vol.63
, pp. 157
-
-
Grassberger, P.1
-
31
-
-
0035907006
-
How viruses spread among computers and people
-
Lloyd AL, May RM (2001) How viruses spread among computers and people. Science 292:1316-1317.
-
(2001)
Science
, vol.292
, pp. 1316-1317
-
-
Lloyd, A.L.1
May, R.M.2
-
32
-
-
34547413871
-
A model of internet topology using k-shell decomposition
-
Carmi S, Havlin S, Kirkpatrick S, Shavitt Y, Shir E (2007) A model of internet topology using k-shell decomposition. Proc Natl Acad Sci USA 104:11150-11154.
-
(2007)
Proc Natl Acad Sci USA
, vol.104
, pp. 11150-11154
-
-
Carmi, S.1
Havlin, S.2
Kirkpatrick, S.3
Shavitt, Y.4
Shir, E.5
|