-
1
-
-
34547399387
-
A Multifaceted Approach to Understanding the Botnet Phenomenon
-
Abu Rajab, M., Zarfoss, J., Monrose, F., Terzis, A.: A Multifaceted Approach to Understanding the Botnet Phenomenon. In: Proc. of SIGCOMM (2006)
-
Proc. of SIGCOMM (2006)
-
-
Abu Rajab, M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
4
-
-
85064176806
-
Measuring Pay-per-Install: The Commoditization of Malware Distribution
-
Caballero, J., Grier, C., Kreibich, C., Paxson, V.: Measuring Pay-per-Install: The Commoditization of Malware Distribution. In: Proc. of the USENIX Security (2011)
-
Proc. of the USENIX Security (2011)
-
-
Caballero, J.1
Grier, C.2
Kreibich, C.3
Paxson, V.4
-
5
-
-
74049095923
-
Dispatcher: Enabling Active Botnet Infiltration using Automatic Protocol Reverse-Engineering
-
Caballero, J., Poosankam, P., Kreibich, C., Song, D.: Dispatcher: Enabling Active Botnet Infiltration using Automatic Protocol Reverse-Engineering. In: Proc. of ACM CCS (2009)
-
Proc. of ACM CCS (2009)
-
-
Caballero, J.1
Poosankam, P.2
Kreibich, C.3
Song, D.4
-
7
-
-
85084097075
-
Insights from the Inside: A View of Botnet Management from Infiltration
-
Cho, C.Y., Caballero, J., Grier, C., Paxson, V., Song, D.: Insights from the Inside: A View of Botnet Management from Infiltration. In: Proc. of LEET (2010)
-
Proc. of LEET (2010)
-
-
Cho, C.Y.1
Caballero, J.2
Grier, C.3
Paxson, V.4
Song, D.5
-
8
-
-
79959993648
-
-
October
-
Click Fraud Rate Rises to 22.3 Percent in Q3 2010 (October 2010), http://www.clickforensics.com/newsroom/press-releases/170-click-fraud-rate- rises-to-223-percent-in-q3-2010.html
-
(2010)
Click Fraud Rate Rises to 22.3 Percent in Q3 2010
-
-
-
11
-
-
85076925998
-
Not-a-Bot: Improving Service Availability in the Face of Botnet Attacks
-
Gummadi, R., Balakrishnan, H., Maniatis, P., Ratnasamy, S.: Not-a-Bot: Improving Service Availability in the Face of Botnet Attacks. In: Proc. of the 6th USENIX Symposium on Networked Systems Design and Implementation, pp. 307-320 (2009)
-
(2009)
Proc. of the 6th USENIX Symposium on Networked Systems Design and Implementation
, pp. 307-320
-
-
Gummadi, R.1
Balakrishnan, H.2
Maniatis, P.3
Ratnasamy, S.4
-
12
-
-
85084097128
-
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm
-
Holz, T., Steiner, M., Dahl, F., Biersack, E., Freiling, F.: Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm. In: Proc. of the LEET (2008)
-
Proc. of the LEET (2008)
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.4
Freiling, F.5
-
13
-
-
85076932663
-
Studying Spamming Botnets Using Botlab
-
John, J.P., Moshchuk, A., Gribble, S.D., Krishnamurthy, A.: Studying Spamming Botnets Using Botlab. In: Proc. of the USENIX NSDI (2009)
-
Proc. of the USENIX NSDI (2009)
-
-
John, J.P.1
Moshchuk, A.2
Gribble, S.D.3
Krishnamurthy, A.4
-
15
-
-
77954610612
-
Large-scale Bot Detection for Search Engines
-
Kang, H., Wang, K., Soukal, D., Behr, F., Zheng, Z.: Large-scale Bot Detection for Search Engines. In: Proc. of WWW(2010)
-
Proc. of WWW(2010)
-
-
Kang, H.1
Wang, K.2
Soukal, D.3
Behr, F.4
Zheng, Z.5
-
16
-
-
84894564658
-
The Goals and Challenges of Click Fraud Penetration Testing Systems
-
Kintana, C., Turner, D., Pan, J.Y., Metwally, A., Daswani, N., Chin, E., Bortz, A.: The Goals and Challenges of Click Fraud Penetration Testing Systems. In: Proc. of the Intl. Symposium on Software Reliability Engineering (2009)
-
Proc. of the Intl. Symposium on Software Reliability Engineering (2009)
-
-
Kintana, C.1
Turner, D.2
Pan, J.Y.3
Metwally, A.4
Daswani, N.5
Chin, E.6
Bortz, A.7
-
17
-
-
0040291388
-
The Click Modular Router
-
Kohler, E., Morris, R., Chen, B., Jannotti, J., Kaashoek, M.F.: The Click Modular Router. ACM Transactions Computer Systems 18, 263-297 (2000), http://doi.acm.org/10.1145/354871.354874
-
(2000)
ACM Transactions Computer Systems
, vol.18
, pp. 263-297
-
-
Kohler, E.1
Morris, R.2
Chen, B.3
Jannotti, J.4
Kaashoek, M.F.5
-
18
-
-
77952908435
-
The Economics of Click Fraud
-
Kshetri, N.: The Economics of Click Fraud. IEEE Security Privacy 8, 45-53 (2010)
-
(2010)
IEEE Security Privacy
, vol.8
, pp. 45-53
-
-
Kshetri, N.1
|