-
2
-
-
80051924605
-
-
Autoit script. http://www.autoitscript.com/autoit3/index.shtml.
-
-
-
-
3
-
-
14344265818
-
Internet traffic classification using Bayesian analysis techniques
-
A.W. Moore and D. Zuev. Internet traffic classification using Bayesian analysis techniques. In ACM SIGMETRICS, 2005.
-
(2005)
ACM SIGMETRICS
-
-
Moore, A.W.1
Zuev, D.2
-
5
-
-
85061529860
-
Bothunter: Detecting malware infection through IDS-driven dialog correlation
-
G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee. Bothunter: Detecting malware infection through IDS-driven dialog correlation. In Proc. USENIX Security, 2007.
-
(2007)
Proc. USENIX Security
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
6
-
-
85075837457
-
Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection
-
G. Gu, R. Perdisci, J. Zhang, and W. Lee. Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection. In Proc. USENIX Security, 2008.
-
(2008)
Proc. USENIX Security
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
7
-
-
0035676057
-
On clustering validation techniques
-
DOI 10.1023/A:1012801612483
-
M. Halkidi, Y. Batistakis, and M. Vazirgiannis. On clustering validation techniques. J. Intell. Inf. Syst., 17(2-3):107-145, 2001. (Pubitemid 34050790)
-
(2001)
Journal of Intelligent Information Systems
, vol.17
, Issue.2-3
, pp. 107-145
-
-
Halkidi, M.1
Batistakis, Y.2
Vazirgiannis, M.3
-
8
-
-
85084097128
-
Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm
-
T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling. Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm. In Proc. USENIX LEET, 2008.
-
(2008)
Proc. USENIX LEET
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.4
Freiling, F.5
-
9
-
-
77952351261
-
Towards complete node enumeration in a peer-to-peer botnet
-
B. Kang, E. C. Tin, and C. P. Lee. Towards complete node enumeration in a peer-to-peer botnet. In Proc. ACM ASIACCS, 2009.
-
(2009)
Proc. ACM ASIACCS
-
-
Kang, B.1
Tin, E.C.2
Lee, C.P.3
-
12
-
-
44449130555
-
Finding peer-to-peer file sharing using coarse network behaviors
-
M.P. Collins and M. K. Reiter. Finding peer-to-peer file sharing using coarse network behaviors. In Proc. ESORICS, 2006.
-
(2006)
Proc. ESORICS
-
-
Collins, M.P.1
Reiter, M.K.2
-
16
-
-
19944406146
-
Accurate, scalable in-network identication of p2p traffic using application signatures
-
S. Sen, O. Spatscheck, and D. Wang. Accurate, scalable in-network identication of p2p traffic using application signatures. In WWW, 2004.
-
(2004)
WWW
-
-
Sen, S.1
Spatscheck, O.2
Wang, D.3
-
18
-
-
49049107082
-
Analysis of the storm and nugache trojans: P2p is here
-
S. Stover, D. Dittrich, J. Hernandez, and S. Dietrich. Analysis of the storm and nugache trojans: P2p is here. In USENIX; login, vol. 32, no. 6, 2007.
-
(2007)
USENIX; Login
, vol.32
, Issue.6
-
-
Stover, S.1
Dittrich, D.2
Hernandez, J.3
Dietrich, S.4
-
19
-
-
77955861102
-
Are your hosts trading or plotting? Telling p2p file-sharing and bots apart
-
T.-F. Yen and M. K. Reiter. Are your hosts trading or plotting? Telling p2p file-sharing and bots apart. In ICDCS, 2010.
-
(2010)
ICDCS
-
-
Yen, T.-F.1
Reiter, M.K.2
-
23
-
-
0030157145
-
Birch: An efficient data clustering method for very large databases
-
ACM Press
-
T. Zhang, R. Ramakrishnan, and M. Livny. Birch: An efficient data clustering method for very large databases. In Proc. ACM SIGMOD. ACM Press, 1996.
-
(1996)
Proc. ACM SIGMOD.
-
-
Zhang, T.1
Ramakrishnan, R.2
Livny, M.3
|