-
1
-
-
33244491931
-
The simple economics of cybercrimes
-
Jan.
-
N. Kshetri, "The simple economics of cybercrimes," IEEE Security & Privacy, vol. 4, no. 1, pp. 33-39, Jan. 2006.
-
(2006)
IEEE Security & Privacy
, vol.4
, Issue.1
, pp. 33-39
-
-
Kshetri, N.1
-
2
-
-
33645320018
-
All wet or dried up? real differences between aquatic and terrestrial food webs
-
J. Shurin, D. Gruner, and H. Hillebrand, "All wet or dried up? real differences between aquatic and terrestrial food webs," Proceedings of the Royal Society B: Biological Sciences, vol. 273, no. 1582, pp. 1-9, 01 2006.
-
(2006)
Proceedings of the Royal Society B: Biological Sciences
, vol.273
, Issue.1582
-
-
Shurin, J.1
Gruner, D.2
Hillebrand, H.3
-
3
-
-
79952050629
-
-
August Last accessed: 19/04/2010. [Online]. Available
-
P. Coogan. (2009, August) Zeus, king of the underground crimeware toolkits. Symantec. Last accessed: 19/04/2010. [Online]. Available: http://www.symantec.com/connect/blogs/zeus-king-underground-crimeware-toolkits
-
(2009)
Zeus, King of the Underground Crimeware Toolkits
-
-
Coogan, P.1
-
4
-
-
77952717608
-
Revealing botnet membership using dnsbl counter-intelligence
-
A. Ramachandran, N. Feamster, and D. Dagon, "Revealing botnet membership using dnsbl counter-intelligence," in Proceedings of USENIX SRUTI06, July 2006, pp. 49-54.
-
Proceedings of USENIX SRUTI06, July 2006
, pp. 49-54
-
-
Ramachandran, A.1
Feamster, N.2
Dagon, D.3
-
5
-
-
49949094072
-
Traffic aggregation for malware detection
-
T.-F. Yen and M. K. Reiter, "Traffic aggregation for malware detection," in Proceedings of the Fifth GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA08), 2008 2008, pp. 207-227.
-
(2008)
Proceedings of the Fifth GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA08), 2008
, pp. 207-227
-
-
Yen, T.-F.1
Reiter, M.K.2
-
6
-
-
85075837457
-
Botminer: Clustering analysis of network traffic for protocol- and structureindependent botnet detection
-
G. Gu, R. Perdisci, J. Zhang, and W. Lee, "Botminer: Clustering analysis of network traffic for protocol- and structureindependent botnet detection," in Proceedings of the USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, August 2008, pp. 139-154.
-
Proceedings of the USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, August 2008
, pp. 139-154
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
7
-
-
85061529860
-
Bothunter: Detecting malware infection through ids-driven dialog correlation
-
Berkeley, CA, USA: USENIX Association
-
G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee, "Bothunter: detecting malware infection through ids-driven dialog correlation," in SS'07: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2007, pp. 1-16.
-
(2007)
SS'07: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
, pp. 1-16
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
8
-
-
85093871360
-
Rishi: Identify bot contaminated hosts by irc nickname evaluation
-
Berkeley, CA, USA: USENIX Association
-
J. Goebel and T. Holz, "Rishi: Identify bot contaminated hosts by irc nickname evaluation," in Proceedings of USENIX HotBots07. Berkeley, CA, USA: USENIX Association, 2007.
-
(2007)
Proceedings of USENIX HotBots07
-
-
Goebel, J.1
Holz, T.2
-
9
-
-
77952415099
-
An inquiry into the nature and causes of the wealth of internet miscreants
-
J. Franklin, V. Paxson, A. Perrig, and S. Savage, "An inquiry into the nature and causes of the wealth of internet miscreants," in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'07), 2007, pp. 375-388.
-
Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'07), 2007
, pp. 375-388
-
-
Franklin, J.1
Paxson, V.2
Perrig, A.3
Savage, S.4
-
10
-
-
33845926633
-
Phoney: Mimicking user response to detect phishing attacks
-
M. Chandrasekaran, R. Chinchani, and S. Upadhyaya, "Phoney: Mimicking user response to detect phishing attacks," in Proceedings of the 2006 International Symposium on the World of Wireless, Mobile and Multimedia Networks, 2006, pp. 5pp.-672.
-
Proceedings of the 2006 International Symposium on the World of Wireless, Mobile and Multimedia Networks, 2006
-
-
Chandrasekaran, M.1
Chinchani, R.2
Upadhyaya, S.3
-
11
-
-
70350402262
-
-
University of Mannheim, Tech. Rep. Reihe Informatik TR-2008-006, December
-
T. Holz, M. Engelberth, and F. Freiling, "Learning more about the underground economy: A case-study of keyloggers and dropzones," University of Mannheim, Tech. Rep. Reihe Informatik TR-2008-006, December 2008.
-
(2008)
Learning More about the Underground Economy: A Case-study of Keyloggers and Dropzones
-
-
Holz, T.1
Engelberth, M.2
Freiling, F.3
-
12
-
-
45949097266
-
A forensic framework for tracing phishers
-
D. Birk, S. Gajek, F. Gröbert, and A.-R. Sadeghi, "A forensic framework for tracing phishers," in IFIP Summer School on The Future of Identity in the Information Society, Karlstad, Sweden, 2007.
-
IFIP Summer School on the Future of Identity in the Information Society, Karlstad, Sweden, 2007
-
-
Birk, D.1
Gajek, S.2
Gröbert, F.3
Sadeghi, A.-R.4
-
13
-
-
15944378973
-
-
July Last accessed: 19/04/2010. [Online]. Available
-
L. Spitzner. (2003, July) Honeytokens: The other honeypot. Symantec. Last accessed: 19/04/2010. [Online]. Available: http://www.symantec.com/connect/ articles/honeytokensother-honeypot
-
(2003)
Honeytokens: The Other Honeypot
-
-
Spitzner, L.1
-
14
-
-
36949007580
-
Cent, five cent, ten cent, dollar: Hitting botnets where it really hurts
-
R. Ford and S. Gordon, "Cent, five cent, ten cent, dollar: Hitting botnets where it really hurts," in Proceedings of New Security Paradigms Workshop, 2006, pp. 3-10.
-
Proceedings of New Security Paradigms Workshop, 2006
, pp. 3-10
-
-
Ford, R.1
Gordon, S.2
-
17
-
-
33745813464
-
The program counter security model: Automatic detection and removal of control-flow side channel attacks
-
D. Molnar, M. Piotrowski, D. Schultz, and D. Wagner, "The program counter security model: Automatic detection and removal of control-flow side channel attacks," in Proceedings of the 8th International Conference on Information Security and Cryptology, Seoul, Korea, December 2005, pp. 156-168.
-
Proceedings of the 8th International Conference on Information Security and Cryptology, Seoul, Korea, December 2005
, pp. 156-168
-
-
Molnar, D.1
Piotrowski, M.2
Schultz, D.3
Wagner, D.4
|