-
1
-
-
77955015710
-
-
Grand Central Terminal, (last accessed Feburary 2, 2010)
-
Grand Central Terminal, http://en.wikipedia.org/wiki/Grand-Central- Terminal (last accessed Feburary 2, 2010)
-
-
-
-
2
-
-
77955014246
-
-
MTA NYC Transit, (last accessed Feburary 2, 2010)
-
MTA NYC Transit: 2007 Ridership by Subway Station (2007), http://www.mta.info/nyct/facts/ridership/ridership-sub.htm (last accessed Feburary 2, 2010)
-
(2007)
2007 Ridership by Subway Station
-
-
-
3
-
-
77955035233
-
-
New York City Subway Rolling Stock, (last accessed Feburary 2, 2010)
-
New York City Subway Rolling Stock, http://www.nycsubway.org/cars/index. html (last accessed Feburary 2, 2010)
-
-
-
-
5
-
-
78649306695
-
-
(last accessed Feburary 2, 2010)
-
Sinit P2P Trojan Analysis, http://www.lurhq.com/sinit.html (last accessed Feburary 2, 2010)
-
Sinit P2P Trojan Analysis
-
-
-
7
-
-
84888402098
-
The zombie roundup: Understanding detecting and disrupting botnets
-
Cambridge MA (June)
-
Cooke, E., Jahanian, F., Mcpherson, D.: The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets. In:Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI), Cambridge, MA (June 2005)
-
(2005)
Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI)
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
8
-
-
77955016995
-
-
F.-S. Corporation, (December), (last accessed Feburary 2, 2010)
-
F.-S. Corporation: F-Secure Computer Virus Descriptions: Cabir (December 2004), http://www.f-secure.com/v-descs/cabir.shtml (last accessed Feburary 2, 2010)
-
(2004)
F-Secure Computer Virus Descriptions: Cabir
-
-
-
9
-
-
77955041981
-
-
F.-S. Corporation, (April), (last accessed Feburary 2, 2010)
-
F.-S. Corporation: F-Secure Computer Virus Descriptions: Mabir.A (April 2005), http://www.f-secure.com/v-descs/mabir.shtml (last accessed Feburary 2, 2010)
-
(2005)
F-Secure Computer Virus Descriptions: Mabir.A
-
-
-
10
-
-
48649089769
-
A taxonomy of botnet structures
-
Miami FL (December)
-
Dagon, D., Gu, G., Lee, C., Lee,W.: A Taxonomy of Botnet Structures. In: Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC), Miami, FL (December 2007)
-
(2007)
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC)
-
-
Dagon, D.1
Gu, G.2
Lee, C.3
Lee, W.4
-
11
-
-
85084161366
-
Tor: The second-generation onion router
-
San Diego CA (August)
-
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium (SECURITY), San Diego, CA (August 2004)
-
(2004)
Proceedings of the 13th USENIX Security Symposium (SECURITY)
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
13
-
-
77955020077
-
-
(last accessed Feburary 2, 2010)
-
Eckman, B.: http://lists.sans.org/pipermail/unisog/2006-April/026261.html (last accessed Feburary 2, 2010)
-
-
-
Eckman, B.1
-
14
-
-
77955014779
-
Security response: SymbOS.Cabir
-
Ferrie, P., Szor, P., Stanev, R., Mouritzen, R.: Security Response: SymbOS.Cabir. Symantec Corporation (2007)
-
(2007)
Symantec Corporation
-
-
Ferrie, P.1
Szor, P.2
Stanev, R.3
Mouritzen, R.4
-
15
-
-
57349123036
-
Can you infect me now?: Malware propagation in mobile phone networks
-
November
-
Fleizach, C., Liljenstam, M., Johansson, P., Voelker, G.M., Mehes, A.: Can You Infect Me Now?: Malware Propagation in Mobile Phone Networks. In: ACM Workshop on Recurring Malcode (WORM), Alexandria, Virginia, USA (November 2007)
-
(2007)
ACM Workshop on Recurring Malcode (WORM) Alexandria Virginia USA
-
-
Fleizach, C.1
Liljenstam, M.2
Johansson, P.3
Voelker, G.M.4
Mehes, A.5
-
16
-
-
33646054897
-
Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks
-
di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. Springer, Heidelberg
-
Freiling, F.C., Holz, T., Wicherski, G.: Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol.3679, pp. 319-335. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3679
, pp. 319-335
-
-
Freiling, F.C.1
Holz, T.2
Wicherski, G.3
-
17
-
-
85075837457
-
Bot Miner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection
-
San Jose CA (July)
-
Gu, G., Perdisci, R., Zhang, J., Lee,W.: BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. In: Proceedings of the 17th USENIX Security Symposium (SECURITY), San Jose, CA (July 2008)
-
(2008)
Proceedings of the 17th USENIX Security Symposium (SECURITY)
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
18
-
-
85061529860
-
BotHunter: Detecting malware infection through IDS-Driven dialog correlation
-
Boston MA (August)
-
Gu, G., Porras, P., Yegneswaran, V., Fong, M., Lee,W.: BotHunter: DetectingMalware Infection Through IDS-Driven Dialog Correlation. In: Proceedings of the 16th USENIX Security Symposium (SECURITY), Boston, MA (August 2007)
-
(2007)
Proceedings of the 16th USENIX Security Symposium (SECURITY)
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
19
-
-
85076932663
-
Studying spamming botnets using botlab
-
Boston MA (April)
-
John, J.P., Moshchuk, A., Gribble, S.D., Krishnamurthy, A.: Studying Spamming Botnets Using Botlab. In: Proceedings of the 6th Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA (April 2009)
-
(2009)
Proceedings of the 6th Symposium on Networked Systems Design and Implementation (NSDI)
-
-
John, J.P.1
Moshchuk, A.2
Gribble, S.D.3
Krishnamurthy, A.4
-
20
-
-
34547626756
-
BlueTorrent: Cooperative content sharing for bluetooth users
-
White Plains NY (March)
-
Jung, S., Lee, U., Chang, A., Cho, D.-K., Gerla, M.: BlueTorrent: Cooperative Content Sharing for Bluetooth Users. In: Proceedings of the 5th IEEE International Conference on Pervasive Computing and Communications (PerCom), White Plains, NY (March 2007)
-
(2007)
Proceedings of the 5th IEEE International Conference on Pervasive Computing and Communications (PerCom)
-
-
Jung, S.1
Lee, U.2
Chang, A.3
Cho, D.-K.4
Gerla, M.5
-
21
-
-
77952374488
-
Security information: Virus encyclopedia: Symbos comwar.a: Technical details
-
Lactaotao, M.: Security Information: Virus Encyclopedia: Symbos comwar.a: Technical Details. Trend Micro Incorporated (2005)
-
(2005)
Trend Micro Incorporated
-
-
Lactaotao, M.1
-
23
-
-
34547297951
-
Worm epidemics in wireless adhoc networks
-
Nekovee, M.: Worm Epidemics in Wireless Adhoc Networks. Journal of Physics 9, 189 (2007)
-
(2007)
Journal of Physics
, vol.9
, pp. 189
-
-
Nekovee, M.1
-
25
-
-
80053650188
-
All Your iFRAMEs Point to Us
-
San Jose CA (July)
-
Provos, N., Mavrommatis, P., Rajab, M.A., Monrose, F.: All Your iFRAMEs Point to Us. In: Proceedings of the 17th USENIX Security Symposium (SECURITY), San Jose, CA (July 2008)
-
(2008)
Proceedings of the 17th USENIX Security Symposium (SECURITY)
-
-
Provos, N.1
Mavrommatis, P.2
Rajab, M.A.3
Monrose, F.4
-
26
-
-
85000701895
-
My botnet is bigger than yours (Maybe Better than Yours): Why size estimates remain challenging
-
Cambridge MA (April)
-
Rajab, M., Zarfoss, J., Monrose, F., Terzis, A.: My Botnet is Bigger than Yours (Maybe, Better than Yours): Why Size Estimates Remain Challenging. In: Proceedings of the 1st Workshop on Hot Topics in Understanding Botnets (HotBots), Cambridge, MA (April 2007)
-
(2007)
Proceedings of the 1st Workshop on Hot Topics in Understanding Botnets (HotBots)
-
-
Rajab, M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
27
-
-
33847737144
-
Understanding the network-level behavior of spammers
-
Pisa Italy (September)
-
Ramachandran, A., Feamster, N.: Understanding the Network-Level Behavior of Spammers. In: Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), Pisa, Italy (September 2006)
-
(2006)
Proceedings of the ACM Conference on Applications Technologies Architectures and Protocols for Computer Communications (SIGCOMM)
-
-
Ramachandran, A.1
Feamster, N.2
-
30
-
-
77955016620
-
-
September, (last accessed Feburary 2, 2010)
-
Srinivasan, V., Natarajan, A., Motani, M.: CRAWDAD data set nus/bluetooth (v. 2007-09- 03) (September 2007), http://crawdad.cs.dartmouth.edu/nus/ bluetooth (last accessed Feburary 2, 2010)
-
(2007)
CRAWDAD Data Set Nus/bluetooth (V. 2007-09- 03)
-
-
Srinivasan, V.1
Natarajan, A.2
Motani, M.3
-
31
-
-
34547218865
-
A preliminary investigation of worm infections in a bluetooth environment
-
Alexandria VA (November)
-
Su, J., Chan, K., Miklas, A., Po, K., Akhavan, A., Saroiu, S., Lara, E., Goel, A.: A Preliminary Investigation of Worm Infections in a Bluetooth Environment. In: ACM Workshop on Recurring Malcode (WORM), Alexandria, VA (November 2006)
-
(2006)
ACM Workshop on Recurring Malcode (WORM)
-
-
Su, J.1
Chan, K.2
Miklas, A.3
Po, K.4
Akhavan, A.5
Saroiu, S.6
Lara, E.7
Goel, A.8
-
32
-
-
70449354248
-
Characterizing the limitations of third-party EAS over cellular text messaging services
-
Traynor, P.: Characterizing the Limitations of Third-Party EAS Over Cellular Text Messaging Services. 3G Americas Whitepaper (2008)
-
(2008)
3G Americas Whitepaper
-
-
Traynor, P.1
-
33
-
-
55849122324
-
Exploiting open functionality in smscapable cellular networks
-
Traynor, P., Enck, W., McDaniel, P., Porta, T.L.: Exploiting Open Functionality in SMSCapable Cellular Networks. Journal of Computer Security (JCS) (2008)
-
(2008)
Journal of Computer Security (JCS)
-
-
Traynor, P.1
Enck, W.2
McDaniel, P.3
Porta, T.L.4
-
34
-
-
74049108559
-
On cellular botnets: Measuring the impact of malicious devices on a cellular network core
-
Chicago IL (November)
-
Traynor, P., Lin, M., Ongtang, M., Rao, V., Jaeger, T., La Porta, T., McDaniel, P.: On Cellular Botnets: Measuring the Impact of Malicious Devices on a Cellular Network Core. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), Chicago, IL (November 2009)
-
(2009)
Proceedings of the ACM Conference on Computer and Communications Security (CCS)
-
-
Traynor, P.1
Lin, M.2
Ongtang, M.3
Rao, V.4
Jaeger, T.5
La Porta, T.6
McDaniel, P.7
-
35
-
-
77955041635
-
-
(Last accessed February 2, 2010)
-
Vamosi, R.: Mobile phone malware in our future (2008), http://news.cnet.com/8301-10789-3-10071982-57.html (Last accessed February 2, 2010)
-
(2008)
Mobile Phone Malware in Our Future
-
-
Vamosi, R.1
-
36
-
-
85084163931
-
Publius: A robust tamper-evident censorship- resistant web publishing system
-
Denver CO (August)
-
Waldman, M., Rubin, A.D., Cranor, L.F.: Publius: A Robust, Tamper-Evident, Censorship- Resistant Web Publishing System. In: Proceedings of the 9th USENIX Security Symposium (SECURITY), Denver, CO (August 2000)
-
(2000)
Proceedings of the 9th USENIX Security Symposium (SECURITY)
-
-
Waldman, M.1
Rubin, A.D.2
Cranor, L.F.3
-
39
-
-
34748827408
-
Bluetooth worm propagation: Mobility pattern matters!
-
Computer and Communications Security (ASIACCS), Singapore (March)
-
Yan, G., Flores, H.D., Cuellar, L., Hengartner, N., Eidenbenz, S., Vu, V.: Bluetooth Worm Propagation: Mobility Pattern Matters! In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS), Singapore (March 2007)
-
(2007)
Proceedings of the 2nd ACM Symposium on Information
-
-
Yan, G.1
Flores, H.D.2
Cuellar, L.3
Hengartner, N.4
Eidenbenz, S.5
Vu, V.6
|