-
1
-
-
42149173109
-
Using uncleanliness to predict future botnet addresses
-
ACM, New York
-
Collins, M.P., Shimeall, T.J., Faber, S., Janies, J., Weaver, R., De Shon, M., Kadane, J.: Using uncleanliness to predict future botnet addresses. In: IMC 2007: Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, pp. 93-104. ACM, New York (2007)
-
(2007)
IMC 2007: Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement
, pp. 93-104
-
-
Collins, M.P.1
Shimeall, T.J.2
Faber, S.3
Janies, J.4
Weaver, R.5
De Shon, M.6
Kadane, J.7
-
2
-
-
48649089769
-
A taxonomy of botnet structures
-
Dagon, D., Gu, G., Lee, C.P., Lee, W.: A taxonomy of botnet structures. In: Computer Security Applications Conference, Annual, pp. 325-339 (2007)
-
(2007)
Computer Security Applications Conference, Annual
, pp. 325-339
-
-
Dagon, D.1
Gu, G.2
Lee, C.P.3
Lee, W.4
-
3
-
-
33746905403
-
Computer Viruses: From Theory to Applications
-
Springer, Heidelberg iSBN 2-287-23939-1
-
Filiol, E.: Computer Viruses: from Theory to Applications. IRIS International series. Springer, Heidelberg (2005), iSBN 2-287-23939-1
-
(2005)
IRIS International Series
-
-
Filiol, E.1
-
5
-
-
85075837457
-
BotMiner: Clustering analysis of network traffic for protocol- And structure-independent botnet detection
-
Gu, G., Perdisci, R., Zhang, J., Lee, W.: BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. In: Proceedings of the 17th USENIX Security Symposium, Security 2008 (2008)
-
(2008)
Proceedings of the 17th USENIX Security Symposium, Security 2008
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
7
-
-
85084097128
-
Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm
-
USENIX Association, Berkeley
-
Holz, T., Steiner, M., Dahl, F., Biersack, E., Freiling, F.: Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm. In: LEET 2008: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, pp. 1-9. USENIX Association, Berkeley (2008)
-
(2008)
LEET 2008: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
, pp. 1-9
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.4
Freiling, F.5
-
11
-
-
78649242902
-
Identification of file infecting viruses through detection of self-reference replication
-
Special EICAR Conference Invited Paper Issue
-
Morales, J.A., Clarke, P.J., Deng, Y., Kibria, B.G.: Identification of file infecting viruses through detection of self-reference replication. Journal in Computer Virology Special EICAR Conference Invited Paper Issue (2008)
-
(2008)
Journal in Computer Virology
-
-
Morales, J.A.1
Clarke, P.J.2
Deng, Y.3
Kibria, B.G.4
-
14
-
-
78649287891
-
-
Sigcheck 1.6, http://technet.microsoft.com/en-us/sysinternals/bb897441. aspx
-
Sigcheck 1.6
-
-
-
15
-
-
78649284427
-
Detecting the code injection by hooking system calls in windows kernel mode
-
Sun, H.M., Tseng, Y.T., Lin, Y.H., Chiang, T.J.: Detecting the code injection by hooking system calls in windows kernel mode. In: 2006 International Computer Symposium, ICS 2006 (2006)
-
(2006)
2006 International Computer Symposium, ICS 2006
-
-
Sun, H.M.1
Tseng, Y.T.2
Lin, Y.H.3
Chiang, T.J.4
-
18
-
-
84869596416
-
Using failure information analysis to detect enterprise zombies
-
Zhu, Z., Yegneswaran, V., Chen, Y.: Using failure information analysis to detect enterprise zombies. In: 5th International ICST Conference on Security and Privacy in Communication Networks, Securecomm 2009 (2009)
-
(2009)
5th International ICST Conference on Security and Privacy in Communication Networks, Securecomm 2009
-
-
Zhu, Z.1
Yegneswaran, V.2
Chen, Y.3
|