-
1
-
-
0036041531
-
Characterizing User Behavior and Network Performance in A Public Wireless LAN
-
ACM, New York
-
Balachandran, A., Voelker, G.M., Bahl, P., Rangan, P.V.: Characterizing User Behavior and Network Performance in A Public Wireless LAN. In: SIGMETRICS 2002: Proceedings of the 2002 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, pp. 195-205. ACM, New York (2002)
-
(2002)
SIGMETRICS 2002: Proceedings of the 2002 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
, pp. 195-205
-
-
Balachandran, A.1
Voelker, G.M.2
Bahl, P.3
Rangan, P.V.4
-
2
-
-
84976582475
-
CharacterizingMobility and Network Usage in A CorporateWireless Local-Area Network
-
ACM, New York
-
Balazinska,M., Castro, P.: CharacterizingMobility and Network Usage in A CorporateWireless Local-Area Network. In: MobiSys 2003: Proceedings of the 1st international conference on Mobile systems, applications and services, pp. 303-316. ACM, New York (2003)
-
(2003)
MobiSys 2003: Proceedings of the 1st international conference on Mobile systems, applications and services
, pp. 303-316
-
-
Balazinska, M.1
Castro, P.2
-
3
-
-
14844331039
-
Web Tap: Detecting Covert Web Traffic
-
Atluri, V, Pfitzmann, B.,McDaniel, P.D, eds, ACM, New York
-
Borders, K., Prakash, A.: Web Tap: Detecting Covert Web Traffic. In: Atluri, V., Pfitzmann, B.,McDaniel, P.D. (eds.) ACM Conference on Computer and Communications Security, pp. 110-120. ACM, New York (2004)
-
(2004)
ACM Conference on Computer and Communications Security
, pp. 110-120
-
-
Borders, K.1
Prakash, A.2
-
4
-
-
76549093829
-
-
A Community Resource for Archiving Wireless Data At Dartmouth (CRAWDAD), http://crawdad.cs.dartmouth.edu/
-
A Community Resource for Archiving Wireless Data At Dartmouth (CRAWDAD), http://crawdad.cs.dartmouth.edu/
-
-
-
-
5
-
-
34247253107
-
Characteristics ofWWWClient-based Traces
-
Technical report, Boston, MA, USA
-
Cunha, C., Bestavros, A., Crovella, M.: Characteristics ofWWWClient-based Traces. Technical report, Boston, MA, USA (1995)
-
(1995)
-
-
Cunha, C.1
Bestavros, A.2
Crovella, M.3
-
6
-
-
48649089769
-
-
ACSAC, pp
-
Dagon, D., Gu, G., Lee, C.P., Lee, W.: A Taxonomy of Botnet Structures. In: ACSAC, pp. 325-339 (2007)
-
(2007)
A Taxonomy of Botnet Structures
, pp. 325-339
-
-
Dagon, D.1
Gu, G.2
Lee, C.P.3
Lee, W.4
-
7
-
-
76549120876
-
-
Georgia Tech Information Security Center October
-
Emerging Cyber Threats Report for 2009, Georgia Tech Information Security Center (October 2008)
-
(2008)
Emerging Cyber Threats Report for 2009
-
-
-
8
-
-
78751511305
-
Measurement and Classification of Humans and Bots in Internet Chat
-
Gianvecchio, S., Xie, M.,Wu, Z.,Wang, H.:Measurement and Classification of Humans and Bots in Internet Chat. In: Proceedings of USENIX Security Symposium (2008)
-
(2008)
Proceedings of USENIX Security Symposium
-
-
Gianvecchio, S.1
Xie, M.2
Wu, Z.3
Wang, H.4
-
9
-
-
85075837457
-
Botminer: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection
-
Gu, G., Perdisci, R., Zhang, J., Lee,W.: Botminer: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. In: Proceedings of the 17th USENIX Security Symposium (2008)
-
(2008)
Proceedings of the 17th USENIX Security Symposium
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
10
-
-
85175133385
-
Botsniffer: Detecting Botnet Command and Control Channels in Network Traffic
-
Gu, G., Zhang, J., Lee, W.: Botsniffer: Detecting Botnet Command and Control Channels in Network Traffic. In: Proceedings of the 15th Annual Network and Distributed System Security Symposium, NDSS (2008)
-
(2008)
Proceedings of the 15th Annual Network and Distributed System Security Symposium, NDSS
-
-
Gu, G.1
Zhang, J.2
Lee, W.3
-
11
-
-
11244321489
-
The Changing Usage of A Mature Campus-wide Wireless Network
-
ACM, New York
-
Henderson, T., Kotz, D., Abyzov, I.: The Changing Usage of A Mature Campus-wide Wireless Network. In: MobiCom 2004: Proceedings of the 10th annual international conference on Mobile computing and networking, pp. 187-201. ACM, New York (2004)
-
(2004)
MobiCom 2004: Proceedings of the 10th annual international conference on Mobile computing and networking
, pp. 187-201
-
-
Henderson, T.1
Kotz, D.2
Abyzov, I.3
-
12
-
-
0032478716
-
Strong Regularities inWorld Wide Web
-
Huberman, B.A., Pirolli, P.L., Pitkow, J.E., Lukose, R.M.: Strong Regularities inWorld Wide Web Surfing. Science 280(95) (1998)
-
(1998)
Surfing. Science
, vol.280
, Issue.95
-
-
Huberman, B.A.1
Pirolli, P.L.2
Pitkow, J.E.3
Lukose, R.M.4
-
13
-
-
76549108470
-
-
Ianelli, N., Hackworth, A.: Botnets as A Vehicle for Online Crime (2005), http://www.cert.org/archive/pdf/Botnets.pdf
-
Ianelli, N., Hackworth, A.: Botnets as A Vehicle for Online Crime (2005), http://www.cert.org/archive/pdf/Botnets.pdf
-
-
-
-
14
-
-
85093872656
-
Wide-Scale Botnet Detection and Characterization
-
Berkeley, CA, USA, p, USENIX Association
-
Karasaridis, A., Rexroad, B., Hoeflin, D.:Wide-Scale Botnet Detection and Characterization. In: HotBots 2007: Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, Berkeley, CA, USA, p. 7. USENIX Association (2007)
-
(2007)
HotBots 2007: Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets
, pp. 7
-
-
Karasaridis, A.1
Rexroad, B.2
Hoeflin, D.3
-
15
-
-
0036957872
-
Analysis of A Campus-wide Wireless Network
-
ACM Press, New York
-
Kotz, D., Essien, K.: Analysis of A Campus-wide Wireless Network. In: Proceedings of ACM Mobicom, pp. 107-118. ACM Press, New York (2002)
-
(2002)
Proceedings of ACM Mobicom
, pp. 107-118
-
-
Kotz, D.1
Essien, K.2
-
16
-
-
48349087157
-
Enhancing Web Browser Security Against Malware Extensions
-
Louw, M.T., Lim, J.S., Venkatakrishnan, V.N.: Enhancing Web Browser Security Against Malware Extensions. Journal in Computer Virology 4(3), 179-195 (2008)
-
(2008)
Journal in Computer Virology
, vol.4
, Issue.3
, pp. 179-195
-
-
Louw, M.T.1
Lim, J.S.2
Venkatakrishnan, V.N.3
-
18
-
-
33847256529
-
The Devil and Packet Trace Anonymization
-
Pang, R., Allman, M., Paxson, V., Lee, J.: The Devil and Packet Trace Anonymization. SIGCOMM Comput. Commun. Rev. 36(1), 29-38 (2006)
-
(2006)
SIGCOMM Comput. Commun. Rev
, vol.36
, Issue.1
, pp. 29-38
-
-
Pang, R.1
Allman, M.2
Paxson, V.3
Lee, J.4
-
19
-
-
1242310066
-
A High-level Programming Environment for Packet Trace Anonymization and Transformation
-
ACM, New York
-
Pang, R., Paxson, V.: A High-level Programming Environment for Packet Trace Anonymization and Transformation. In: SIGCOMM 2003: Proceedings of the 2003 conference on Applications, technologies,architectures, and protocols for computer communications, pp. 339-351. ACM, New York (2003)
-
(2003)
SIGCOMM 2003: Proceedings of the 2003 conference on Applications, technologies,architectures, and protocols for computer communications
, pp. 339-351
-
-
Pang, R.1
Paxson, V.2
-
20
-
-
85084162270
-
Design and Implementation of a TCG-based Integrity Measurement Architecture
-
USENIX
-
Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and Implementation of a TCG-based Integrity Measurement Architecture. In: USENIX Security Symposium, pp. 223-238. USENIX (2004)
-
(2004)
USENIX Security Symposium
, pp. 223-238
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
van Doorn, L.4
-
21
-
-
14844287488
-
-
Saroiu, S., Gribble, S.D., Levy, H.M.:Measurement and Analysis of Spyware in a University Environment, pp. 141-153
-
Measurement and Analysis of Spyware in a University Environment
, pp. 141-153
-
-
Saroiu, S.1
Gribble, S.D.2
Levy, H.M.3
-
23
-
-
84991765629
-
Automated Worm Fingerprinting
-
Berkeley, CA, USA. USENIX Association
-
Singh, S., Estan, C., Varghese, G., Savage, S.: Automated Worm Fingerprinting. In: OSDI 2004: Proceedings of the 6th conference on Symposium on Opearting Systems Design Implementation, Berkeley, CA, USA. USENIX Association (2004)
-
(2004)
OSDI 2004: Proceedings of the 6th conference on Symposium on Opearting Systems Design Implementation
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
26
-
-
76549083797
-
-
Symantec, http://www.symantec.com/index.jsp
-
Symantec
-
-
-
28
-
-
76549120207
-
-
Trusted Computing Group. Trusted platform module main specification, Part 1: Design principles, Part 2: TPM structures, Part 3: Commands. Version 1.2, Revision 62 (October 2003)
-
Trusted Computing Group. Trusted platform module main specification, Part 1: Design principles, Part 2: TPM structures, Part 3: Commands. Version 1.2, Revision 62 (October 2003)
-
-
-
-
29
-
-
76549117048
-
-
TCG PC Client Specific TPM Interface Specification (TIS), Version 1.2. Trusted Computing Group, http://www.trustedcomputinggroup.org/groups/pc-client/
-
TCG PC Client Specific TPM Interface Specification (TIS), Version 1.2. Trusted Computing Group, http://www.trustedcomputinggroup.org/groups/pc-client/
-
-
-
-
31
-
-
65249165325
-
Spamming Botnets: Signatures and Characteristics
-
ACM, New York
-
Xie, Y., Yu, F., Achan, K., Panigrahy, R., Hulten, G., Osipkov, I.: Spamming Botnets: Signatures and Characteristics. In: SIGCOMM 2008: Proceedings of the ACM SIGCOMM 2008 conference on Data communication, pp. 171-182. ACM, New York (2008)
-
(2008)
SIGCOMM 2008: Proceedings of the ACM SIGCOMM 2008 conference on Data communication
, pp. 171-182
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
-
32
-
-
76549131537
-
User-Assisted Host-Based Detection of Outbound Malware Traffic
-
Technical report, Rutgers University October
-
Xiong, H., Malhotra, P., Stefan, D.,Wu, C., Yao, D.: User-Assisted Host-Based Detection of Outbound Malware Traffic. Technical report, Rutgers University (October 2009)
-
(2009)
-
-
Xiong, H.1
Malhotra, P.2
Stefan, D.3
Wu, C.4
Yao, D.5
|