-
1
-
-
70450253956
-
-
The CAPTCHA project
-
The CAPTCHA project. http://www.captcha.net.
-
-
-
-
3
-
-
79251578513
-
On the (im)possibility of obfuscating programs
-
Advances in Cryptology-CRYPTO'01, of, Springer
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, Salil Vadhan, and K. Yang. On the (im)possibility of obfuscating programs. In Advances in Cryptology-CRYPTO'01, volume 2139 of Lecture Notes in Computer Science, pages 1-18. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
4
-
-
85029644174
-
The emperor's old armor
-
New York, NY, USA, ACM
-
Bob Blakley. The emperor's old armor. In Proceedings of the 1996 Workshop on New Security Paradigms (NSPW'96), pages 2-16, New York, NY, USA, 1996. ACM.
-
(1996)
Proceedings of the 1996 Workshop on New Security Paradigms (NSPW'96)
, pp. 2-16
-
-
Blakley, B.1
-
7
-
-
84885679117
-
Vigilante: End-to-end containment of internet worms
-
ACM Press
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: End-to-end containment of internet worms. In Proceedings of the Twentieth ACM Symposium on Operating Systems Principles (SOSP'05), pages 133-147. ACM Press, 2005.
-
(2005)
Proceedings of the Twentieth ACM Symposium on Operating Systems Principles (SOSP'05)
, pp. 133-147
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
8
-
-
36949007580
-
Cent, five cent, ten cent, dollar: Hitting botnets where it really hurts
-
New York, NY, USA, ACM
-
Richard Ford and Sarah Gordon. Cent, five cent, ten cent, dollar: hitting botnets where it really hurts. In Proceedings of the 2006 Workshop on New Security Paradigms (NSPW'06), pages 3-10, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 2006 Workshop on New Security Paradigms (NSPW'06)
, pp. 3-10
-
-
Ford, R.1
Gordon, S.2
-
10
-
-
35048880908
-
Detecting unknown massive mailing viruses using proactive methods
-
Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, of, Springer
-
R. Hu and A. Mok. Detecting unknown massive mailing viruses using proactive methods. In Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, volume 3224 of Lecture Notes in Computer Science, pages 82-101. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3224
, pp. 82-101
-
-
Hu, R.1
Mok, A.2
-
12
-
-
70450273970
-
-
Don Jackson. Gozi trojan. http://www.secureworks.com/research/threats/ gozi/, 2007.
-
(2007)
Don Jackson. Gozi trojan
-
-
-
13
-
-
70450234262
-
-
empirical view, 2005
-
Carl Landwehr. Secure grid computing: An empirical view. http://www.laas.fr/IFIPWG/Workshops&Meetings/48/WS1/10-Landwehr.pdf, 2005.
-
Carl Landwehr. Secure grid computing: An
-
-
-
16
-
-
70450247799
-
-
McAfee. Virtual criminology report. http://www.mcafee.com/us/local- content/white-papers/threat-center/wp-virtual-criminology-report-2007.pdf, 2006.
-
(2006)
McAfee. Virtual criminology report
-
-
-
17
-
-
23944454354
-
Automated identity theft
-
89-92
-
Bill McCarty. Automated identity theft. IEEE Security and Privacy, 01(5):89-92, 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.5
-
-
McCarty, B.1
-
21
-
-
70450244091
-
-
Symantec Internet security threat report, trends for July-December 2006. http://www.symantec.com.
-
Symantec Internet security threat report, trends for July-December 2006. http://www.symantec.com.
-
-
-
-
22
-
-
34548043748
-
Sweeper: A lightweight end-to-end system for defending against fast worms
-
ACM Press
-
J. Tucek, S. Lu, C. Huang, S. Xanthos, Y. Zhou, J. Newsome, D. Brumley, and D. Song. Sweeper: A lightweight end-to-end system for defending against fast worms. In Proceedings of the 2007 European Conference on Computer Systems (EuroSys'07), pages 115-128. ACM Press, 2007.
-
(2007)
Proceedings of the 2007 European Conference on Computer Systems (EuroSys'07)
, pp. 115-128
-
-
Tucek, J.1
Lu, S.2
Huang, C.3
Xanthos, S.4
Zhou, Y.5
Newsome, J.6
Brumley, D.7
Song, D.8
-
23
-
-
84948951525
-
Throttling viruses: Restricting propagation to defeat malicious mobile code
-
IEEE Computer Society
-
M. Williamson. Throttling viruses: Restricting propagation to defeat malicious mobile code. In 18th Annual Computer Security Applications Conference (ACSAC 2002), pages 61-68. IEEE Computer Society, 2002.
-
(2002)
18th Annual Computer Security Applications Conference (ACSAC 2002)
, pp. 61-68
-
-
Williamson, M.1
|