-
1
-
-
84870704453
-
-
Adobe flash player. http://www.adobe.com/products/flashplayer/.
-
Adobe Flash Player
-
-
-
4
-
-
77955193186
-
-
version 6.3
-
Cisco pix 515e firewall quick start guide, version 6.3. http://www.ciscosystems.org.ro/en/US/docs/security/pix/pi x63/quick/guide/63- 515qk.html.
-
Cisco Pix 515e Firewall Quick Start Guide
-
-
-
6
-
-
77955206941
-
-
Hacking the interwebs. http://www.gnucitizen.org/blog/hacking- the- interwebs/.
-
Hacking the Interwebs
-
-
-
11
-
-
77955198231
-
-
09-06
-
The new pOf 2.0.8 (2006-09-06). http://lcamtuf.coredump. cx/p0f.shtml.
-
(2006)
The New POf 2.0.8
-
-
-
13
-
-
77955181537
-
-
Port 25 blocking. http://www.postcastserver.com/help/Port-25-Blocking. aspx.
-
-
-
-
14
-
-
77955190567
-
-
Port 25 (sonic.net). http://sonic.net/ support/faq/advanced/port-25. shtml.
-
-
-
-
17
-
-
77955215725
-
-
Sorbs. http://www.au.sorbs.net/.
-
-
-
-
18
-
-
77955212742
-
-
Spamcop. http://www.spamcop.net/.
-
-
-
-
19
-
-
77955195028
-
-
Spamhaus. http://www.spamhaus.org/.
-
-
-
-
22
-
-
77955203366
-
-
Universal plug and play. http://en.wikipedia.org/wiki/Universal-Plug-and- Play/.
-
-
-
-
26
-
-
33750953387
-
Ingress filtering for multihomed networks
-
F. Baker and P. Savola. Ingress filtering for multihomed networks. In RFC 3704, 2004.
-
(2004)
RFC
, vol.3704
-
-
Baker, F.1
Savola, P.2
-
27
-
-
84877726988
-
Understanding the efficacy of deployed internet source address validation filtering
-
R. Beverly, A. Berger, Y. Hyun, and k claffy. Understanding the efficacy of deployed internet source address validation filtering. In In Proc. of IMC, 2009.
-
(2009)
Proc. of IMC
-
-
Beverly, R.1
Berger, A.2
Hyun, Y.3
Claffy, K.4
-
28
-
-
0003334329
-
Network ingress filtering: Defeating denial of service attacks which employ ip source address spoofing
-
P. Ferguson and D. Senie. Network ingress filtering: Defeating denial of service attacks which employ ip source address spoofing. In RFC 2827, 2000.
-
(2000)
RFC
, pp. 2827
-
-
Ferguson, P.1
Senie, D.2
-
29
-
-
85041447270
-
Detecting spammers with SNARE: Spatiotemporal network-level automatic reputation engine
-
March
-
S. Hao, N. A. Syed, N. Feamster, A. Gray, and S. Krasser. Detecting Spammers with SNARE: Spatiotemporal Network-level Automatic Reputation Engine. In Proceedings of Usenix Security Symposium, March 2009.
-
(2009)
Proceedings of Usenix Security Symposium
-
-
Hao, S.1
Syed, N.A.2
Feamster, N.3
Gray, A.4
Krasser, S.5
-
30
-
-
84904801371
-
An empirical study of clustering behavior of spammers and group-based anti-spam strategies
-
F. Li and M.-H. Hsieh. An empirical study of clustering behavior of spammers and group-based anti-spam strategies. In In Proc. of CEAS, 2006.
-
(2006)
Proc. of CEAS
-
-
Li, F.1
Hsieh, M.-H.2
-
32
-
-
84904804565
-
An adaptive, semi-structured language model approach to spam filtering on a new corpus
-
July 2006
-
B. Medlock. An adaptive, semi-structured language model approach to spam filtering on a new corpus. In CEAS 2006 - Third Conference on Email and Anti-Spam, July 2006.
-
CEAS 2006 - Third Conference on Email and Anti-Spam
-
-
Medlock, B.1
-
36
-
-
58149096147
-
Shades of grey: On the effectiveness of reputation-based blacklists
-
S. Sinha, M. Bailey, and F. Jahanian. Shades of Grey: On the Effectiveness of Reputation-based "Blacklists". In Malware 2008, 2008.
-
(2008)
Malware 2008
-
-
Sinha, S.1
Bailey, M.2
Jahanian, F.3
-
38
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna. Your botnet is my botnet: Analysis of a botnet takeover. In In Proc. of CCS, 2009.
-
(2009)
Proc. of CCS
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
39
-
-
70350215415
-
Exploiting network structure for proactive spam mitigation
-
S. Venkataraman, S. Sen, O. Spatscheck, P. Haffner, and D. Song. Exploiting network structure for proactive spam mitigation. In In Proc. of USENIX Security Symposium, 2007.
-
(2007)
Proc. of USENIX Security Symposium
-
-
Venkataraman, S.1
Sen, S.2
Spatscheck, O.3
Haffner, P.4
Song, D.5
-
40
-
-
42149099904
-
Towards network triangle inequality violation aware distributed systems
-
G. Wang, B. Zhang, and T. S. E. Ng. Towards network triangle inequality violation aware distributed systems. In In Proc. of IMC, 2007.
-
(2007)
Proc. of IMC
-
-
Wang, G.1
Zhang, B.2
Ng, T.S.E.3
-
41
-
-
33947503628
-
Defense against spoofed ip traffic using hop-count filtering
-
H. Wang, C. Jin, and K. G. Shin. Defense against spoofed ip traffic using hop-count filtering. IEEE/ACM Trans. Netw., 2007.
-
(2007)
IEEE/ACM Trans. Netw
-
-
Wang, H.1
Jin, C.2
Shin, K.G.3
-
42
-
-
47649085264
-
A multi-layer framework for puzzle-based denial-of-service defense
-
X. Wang and M. K. Reiter. A multi-layer framework for puzzle-based denial-of-service defense. Int. J. Inf. Secur., 2008.
-
(2008)
Int. J. Inf. Secur.
-
-
Wang, X.1
Reiter, M.K.2
|