-
1
-
-
67649646371
-
Distinct Counting with a Self-Learning Bitmap
-
Shanghai, Chn.
-
A. Chen, and, J. Cao, "Distinct Counting with a Self-Learning Bitmap," Proc. 25th IEEE Internat. Conf. on Data Eng. (ICDE '09) (Shanghai, Chn., 2009), pp. 1171-1174.
-
(2009)
Proc. 25th IEEE Internat. Conf. on Data Eng. (ICDE '09)
, pp. 1171-1174
-
-
Chen, A.1
Cao, J.2
-
2
-
-
77950564204
-
The Ecology of Malware
-
Lake Tahoe, CA
-
J. R. Crandall, R. Ensafi, S. Forrest, J. Ladau, and, B. Shebaro, "The Ecology of Malware," Proc. New Security Paradigms Workshop (NSPW '08) (Lake Tahoe, CA, 2008), pp. 99-106.
-
(2008)
Proc. New Security Paradigms Workshop (NSPW '08)
, pp. 99-106
-
-
Crandall, J.R.1
Ensafi, R.2
Forrest, S.3
Ladau, J.4
Shebaro, B.5
-
3
-
-
57149103344
-
Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?
-
Malaga, Sp.
-
C. R. Davis, S. Neville, J. M. Fernandez, J.-M. Robert, and, J. McHugh, "Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?," Proc. 13th Eur. Symp. on Res. in Comput. Security (ESORICS '08) (Malaga, Sp., 2008), pp. 461-480.
-
(2008)
Proc. 13th Eur. Symp. on Res. in Comput. Security (ESORICS '08)
, pp. 461-480
-
-
Davis, C.R.1
Neville, S.2
Fernandez, J.M.3
Robert, J.-M.4
McHugh, J.5
-
4
-
-
19544394713
-
Bitmap algorithms for counting active flows on high speed links
-
Proceedings of the 2003 ACM SIGCOMM Internet Measurement Conference, IMC 2003
-
C. Estan, G. Varghese, and, M. Fisk, "Bitmap Algorithms for Counting Active Flows on High Speed Links," Proc. 3rd ACM SIGCOMM Internet Measurement Conf. (IMC '03) (Miami Beach, FL, 2003), pp. 153-166. (Pubitemid 40730647)
-
(2003)
Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC
, pp. 153-166
-
-
Estan, C.1
Varghese, G.2
Fisk, M.3
-
5
-
-
79958200031
-
Rolling Review: Alcatel-Lucent OmniSwitch
-
Aug. 9
-
M. Fratto, "Rolling Review: Alcatel-Lucent OmniSwitch," InformationWeek, Aug. 9, 2008, < http://www.informationweek.com/news/ infrastructure/showArticle.jhtml?articleID=209903837>.
-
(2008)
InformationWeek
-
-
Fratto, M.1
-
6
-
-
79958212919
-
McAfee Bug Forces Massive PC Cleanup
-
Apr. 22
-
A. Gonsalves, "McAfee Bug Forces Massive PC Cleanup," InformationWeek, Apr. 22, 2010, < http://www.informationweek.com/news/ software/app-optimization/showArticle.jhtml?articleID=224600157>.
-
(2010)
InformationWeek
-
-
Gonsalves, A.1
-
7
-
-
85061529860
-
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation
-
Boston, MA
-
G. Gu, P. Porras, V. Yegneswaran, M. Fong, and, W. Lee, "BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation," Proc. 16th USENIX Security Symp. (SS '07) (Boston, MA, 2007), pp. 167-182.
-
(2007)
Proc. 16th USENIX Security Symp. (SS '07)
, pp. 167-182
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
8
-
-
84928140517
-
Measuring and Detecting Fast-Flux Service Networks
-
(San Diego, CA,), session 6
-
T. Holz, C. Gorecki, K. Rieck, and, F. C. Freiling, "Measuring and Detecting Fast-Flux Service Networks," Proc. 16th Annual Network and Distrib. Syst. Security Symp. (NDSS '08) (San Diego, CA, 2008), session 6.
-
(2008)
Proc. 16th Annual Network and Distrib. Syst. Security Symp. (NDSS '08)
-
-
Holz, T.1
Gorecki, C.2
Rieck, K.3
Freiling, F.C.4
-
10
-
-
85076932663
-
Studying Spamming Botnets Using Botlab
-
Boston, MA
-
J. P. John, A. Moshchuk, S. D. Gribble, and, A. Krishnamurthy, "Studying Spamming Botnets Using Botlab," Proc. 6th USENIX Symp. on Networked Syst. Design and Implementation (NSDI '09) (Boston, MA, 2009), pp. 291-306.
-
(2009)
Proc. 6th USENIX Symp. on Networked Syst. Design and Implementation (NSDI '09)
, pp. 291-306
-
-
John, J.P.1
Moshchuk, A.2
Gribble, S.D.3
Krishnamurthy, A.4
-
11
-
-
79958221258
-
Microsoft Recruited Top-Notch Security Guns for Waledac Takedown
-
Feb. 25
-
J. Kirk, "Microsoft Recruited Top-Notch Security Guns for Waledac Takedown," IDG News Service, Feb. 25, 2010, < http://www.networkworld. com/news/2010/022510-microsoft-recruited-top-notch-guns.html>.
-
(2010)
IDG News Service
-
-
Kirk, J.1
-
12
-
-
79958228355
-
ISPs under Pressure to Crack Down on Bots and Spam
-
June 9
-
R. Lemos, "ISPs Under Pressure to Crack Down on Bots and Spam," DarkReading, June 9, 2010, < http://www.darkreading.com/securityservices/ 167801101/security/client-security/225600129/isps-under-pressure-to-crack-down- on-bots-and-spam.html>.
-
(2010)
DarkReading
-
-
Lemos, R.1
-
13
-
-
79956126097
-
Defying Experts, Rogue Computer Code Still Lurks
-
Aug. 26
-
J. Markoff, "Defying Experts, Rogue Computer Code Still Lurks," New York Times, Aug. 26, 2009, < http://www.nytimes.com/2009/08/27/ technology/27compute.html>.
-
(2009)
New York Times
-
-
Markoff, J.1
-
15
-
-
79958208851
-
Nasty Banking Trojan Makes Mules of Victims
-
Oct. 5
-
R. McMillan, "Nasty Banking Trojan Makes Mules of Victims," IDG News Service, Oct. 5, 2009, < http://www.networkworld.com/news/2009/100609- nasty-banking-trojanmakes-mules.html>.
-
(2009)
IDG News Service
-
-
McMillan, R.1
-
16
-
-
49949091964
-
FluXOR: Detecting and Monitoring Fast-Flux Service Networks
-
Paris, Fra.
-
E. Passerini, R. Paleari, L. Martignoni, and, D. Bruschi, "FluXOR: Detecting and Monitoring Fast-Flux Service Networks," Proc. 5th Internat. Conf. on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA '08) (Paris, Fra., 2008), pp. 186-206.
-
(2008)
Proc. 5th Internat. Conf. on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA '08)
, pp. 186-206
-
-
Passerini, E.1
Paleari, R.2
Martignoni, L.3
Bruschi, D.4
-
18
-
-
74049154670
-
Your Botnet is My Botnet: Analysis of a Botnet Takeover
-
Chicago, IL
-
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and, G. Vigna, "Your Botnet is My Botnet: Analysis of a Botnet Takeover," Proc. 16th ACM Conf. on Comput. and Commun. Security (CCS '09) (Chicago, IL, 2009), pp. 635-647.
-
(2009)
Proc. 16th ACM Conf. on Comput. and Commun. Security (CCS '09)
, pp. 635-647
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
19
-
-
79958224113
-
Waledac, Part 2: Its Bootstraps and Armor
-
Aug. 14
-
G. Tenebro, "Waledac, Part 2: Its Bootstraps and Armor," Symantec Connect, Aug. 14, 2009, < http://www.symantec.com/connect/blogs/ waledac-part-2-its-bootstraps-andarmor>.
-
(2009)
Symantec Connect
-
-
Tenebro, G.1
-
20
-
-
65249165325
-
Spamming Botnets: Signatures and Characteristics
-
Seattle, WA
-
Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and, I. Osipkov, "Spamming Botnets: Signatures and Characteristics," Proc. ACM SIGCOMM Conf. on Data Commun. (SIGCOMM '08) (Seattle, WA, 2008), pp. 171-182.
-
(2008)
Proc. ACM SIGCOMM Conf. on Data Commun. (SIGCOMM '08)
, pp. 171-182
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
|