-
1
-
-
85167540550
-
-
Botlab. http://botlab.cs.washington.edu/.
-
-
-
-
8
-
-
85167539404
-
-
Win32/hamewq. http: //www.microsoft.com/security/portal/Threat/ Encyclopedia/Entry.aspx?Name=Win32/Hamweq.
-
-
-
-
9
-
-
84867757379
-
-
Yahoo webspam database. http://barcelona.research.yahoo.net/webspam/ datasets/uk2007/.
-
Yahoo Webspam Database
-
-
-
10
-
-
33845807843
-
Spam filtering using statistical data compression models
-
A. Bratko, G. V. Cormack, B. Filipic, T. R. Lynam, and B. Zupan. Spam filtering using statistical data compression models. Journal of Machine Learning Research 7, 2006.
-
(2006)
Journal of Machine Learning Research
, vol.7
-
-
Bratko, A.1
Cormack, G.V.2
Filipic, B.3
Lynam, T.R.4
Zupan, B.5
-
12
-
-
55649124625
-
Kwyjibo: Automatic domain name generation
-
John Wiley & Sons, Ltd.
-
H. Crawford and J. Aycock. Kwyjibo: Automatic Domain Name Generation. In Software Practice and Experience, John Wiley & Sons, Ltd., 2008.
-
(2008)
Software Practice and Experience
-
-
Crawford, H.1
Aycock, J.2
-
16
-
-
85084097128
-
Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm
-
April
-
T. Holz, M. Steiner, F. Dahl, E. W. Biersack, and F. Freiling. Measurements and Mitigation of Peer-to-peer-based Botnets: A Case Study on Storm Worm. In First Usenix Workshop on Large-scale Exploits and Emergent Threats (LEET), April 2008.
-
(2008)
First Usenix Workshop on Large-scale Exploits and Emergent Threats (LEET)
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.W.4
Freiling, F.5
-
17
-
-
84875641129
-
Beyond blacklists: Learning to detect malicious web sites from suspicious URLs
-
July
-
S. S. J. Ma, L.K. Saul and G. Voelker. Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs. Proc. of ACM KDD, July 2009.
-
(2009)
Proc. of ACM KDD
-
-
Ma, S.S.J.1
Saul, L.K.2
Voelker, G.3
-
23
-
-
67649971754
-
Fluxor : Detecting and monitoring fast-flux service networks
-
E. Passerini, R. Paleari, L. Martignoni, and D. Bruschi. Fluxor : Detecting and Monitoring Fast-flux Service Networks. Detection of Intrusions and Malware, and Vulnerability Assessment, 2008.
-
(2008)
Detection of Intrusions and Malware, and Vulnerability Assessment
-
-
Passerini, E.1
Paleari, R.2
Martignoni, L.3
Bruschi, D.4
-
29
-
-
80052735307
-
Inside the storm: Protocols and encryption of the storm botnet
-
USA
-
J. Stewart. Inside the Storm: Protocols and Encryption of the Storm Botnet. Black Hat Technical Security Conference, USA, 2008.
-
(2008)
Black Hat Technical Security Conference
-
-
Stewart, J.1
-
30
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
nov
-
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna. Your Botnet is my Botnet: Analysis of a Botnet Takeover. In ACM Conference on Computer and Communications Security (CCS), nov 2009.
-
(2009)
ACM Conference on Computer and Communications Security (CCS)
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
33
-
-
65249165325
-
Spamming botnets: Signatures and characteristics
-
Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov. Spamming Botnets: Signatures and Characteristics. ACM SIGCOMM Computer Communication Review, 2008.
-
(2008)
ACM SIGCOMM Computer Communication Review
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
-
34
-
-
79954733367
-
Botgraph: Large scale spamming botnet detection
-
Y. Zhao, Y. Xie, F. Yu, Q. Ke, Y. Yu, Y. Chen, and E. Gillum. Botgraph: Large Scale Spamming Botnet Detection. USENIX Symposium on Networked Systems and Design Implementation (NSDI '09), 2009.
-
(2009)
USENIX Symposium on Networked Systems and Design Implementation (NSDI ' 09)
-
-
Zhao, Y.1
Xie, Y.2
Yu, F.3
Ke, Q.4
Yu, Y.5
Chen, Y.6
Gillum, E.7
|