-
1
-
-
72449205441
-
Identifying vulnerable websites by analysis of common strings in phishing URLs
-
B. Wardman, G. Shukla, and G. Warner, "Identifying vulnerable websites by analysis of common strings in phishing URLs," in eCrime Researchers Summit, 2009. eCRIME '09., 20 2009-Oct. 21 2009, pp. 1-13.
-
eCrime Researchers Summit, 2009. ECRIME '09., 20 2009-Oct. 21 2009
, pp. 1-13
-
-
Wardman, B.1
Shukla, G.2
Warner, G.3
-
2
-
-
72449130877
-
A novel anti-phishing framework based on honeypots
-
S. Li and R. Schmitz, "A novel anti-phishing framework based on honeypots," in eCrime Researchers Summit, 2009. eCRIME '09., 20 2009-Oct. 21 2009, pp. 1-13.
-
eCrime Researchers Summit, 2009. ECRIME '09., 20 2009-Oct. 21 2009
, pp. 1-13
-
-
Li, S.1
Schmitz, R.2
-
3
-
-
79952527132
-
Automatically determining phishing campaigns using the USCAP methodology
-
R. Layton, P. Watters, and R. Dazeley, "Automatically determining phishing campaigns using the USCAP methodology," in eCrime Researchers Summit (eCrime), 2010, Oct. 2010, pp. 1-8.
-
eCrime Researchers Summit (ECrime), 2010, Oct. 2010
, pp. 1-8
-
-
Layton, R.1
Watters, P.2
Dazeley, R.3
-
5
-
-
84904793179
-
An empirical analysis of phishing blacklists
-
S. Sheng, B. Wardman, G. Warner, L. Cranor, J. Hong, and C. Zhang, "An empirical analysis of phishing blacklists," in CEAS 2009 - Sixth Conference on Email and Anti-Spam, Jul. 2009.
-
CEAS 2009 - Sixth Conference on Email and Anti-Spam, Jul. 2009
-
-
Sheng, S.1
Wardman, B.2
Warner, G.3
Cranor, L.4
Hong, J.5
Zhang, C.6
-
7
-
-
65249158950
-
Digital forensics
-
March-April
-
M. A. Caloyannides, N. Memon, and W. Venema, "Digital forensics," Security Privacy, IEEE, vol. 7, no. 2, pp. 16-17, March-April 2009.
-
(2009)
Security Privacy, IEEE
, vol.7
, Issue.2
, pp. 16-17
-
-
Caloyannides, M.A.1
Memon, N.2
Venema, W.3
-
8
-
-
4344706333
-
Honeypot forensics part 1: Analyzing the network
-
July-Aug
-
F. Raynal, Y. Berthier, P. Biondi, and D. Kaminsky, "Honeypot forensics part 1: analyzing the network," Security Privacy, IEEE, vol. 2, no. 4, pp. 72-78, July-Aug 2004.
-
(2004)
Security Privacy, IEEE
, vol.2
, Issue.4
, pp. 72-78
-
-
Raynal, F.1
Berthier, Y.2
Biondi, P.3
Kaminsky, D.4
-
9
-
-
12844259528
-
Honeypot forensics, part ii: Analyzing the compromised host
-
Sept-Oct
-
-, "Honeypot forensics, part ii: analyzing the compromised host," Security Privacy, IEEE, vol. 2, no. 5, pp. 77-80, Sept-Oct 2004.
-
(2004)
Security Privacy, IEEE
, vol.2
, Issue.5
, pp. 77-80
-
-
-
10
-
-
2342504557
-
Computer network security: Report from MMM-ACNS
-
Jan-Feb
-
N. Sklavos, N. Modovyan, V. Grorodetsky, and O. Koufopavlou, "Computer network security: report from MMM-ACNS," Security Privacy, IEEE, vol. 2, no. 1, pp. 49-52, Jan-Feb 2004.
-
(2004)
Security Privacy, IEEE
, vol.2
, Issue.1
, pp. 49-52
-
-
Sklavos, N.1
Modovyan, N.2
Grorodetsky, V.3
Koufopavlou, O.4
-
11
-
-
65249186371
-
Digital forensics works
-
March-April
-
B. Carrier, "Digital forensics works," Security Privacy, IEEE, vol. 7, no. 2, pp. 26-29, March-April 2009.
-
(2009)
Security Privacy, IEEE
, vol.7
, Issue.2
, pp. 26-29
-
-
Carrier, B.1
-
12
-
-
65249091864
-
Enriching network security analysis with time travel
-
New York, NY, USA: ACM, [Online]. Available
-
G. Maier, R. Sommer, H. Dreger, A. Feldmann, V. Paxson, and F. Schneider, "Enriching network security analysis with time travel," in Proceedings of the ACM SIGCOMM 2008 conference on Data communication, ser. SIGCOMM '08. New York, NY, USA: ACM, 2008, pp. 183-194. [Online]. Available: http://doi.acm.org/10.1145/1402958.1402980
-
(2008)
Proceedings of the ACM SIGCOMM 2008 Conference on Data Communication, Ser. SIGCOMM '08
, pp. 183-194
-
-
Maier, G.1
Sommer, R.2
Dreger, H.3
Feldmann, A.4
Paxson, V.5
Schneider, F.6
-
13
-
-
0037619265
-
Web search for a planet: The Google cluster architecture
-
March-April
-
L. Barroso, J. Dean, and U. Holzle, "Web search for a planet: The Google cluster architecture," Micro, IEEE, vol. 23, no. 2, pp. 22-28, March-April 2003.
-
(2003)
Micro, IEEE
, vol.23
, Issue.2
, pp. 22-28
-
-
Barroso, L.1
Dean, J.2
Holzle, U.3
-
14
-
-
21644437974
-
The Google file system
-
S. Ghemawat, H. Gobioff, and S.-T. Leung, "The Google file system," in SOSP, 2003, pp. 29-43.
-
(2003)
SOSP
, pp. 29-43
-
-
Ghemawat, S.1
Gobioff, H.2
Leung, S.-T.3
-
15
-
-
85030321143
-
MapReduce: Simplified Data Processing on Large Clusters
-
J. Dean and S. Ghemawat, "MapReduce: Simplified Data Processing on Large Clusters," in OSDI, 2004, pp. 137-150.
-
(2004)
OSDI
, pp. 137-150
-
-
Dean, J.1
Ghemawat, S.2
-
16
-
-
50849110621
-
-
Center for Research on Computation and Society School for Engineering and Applied Sciences, Harvard University, Tech. Rep.
-
S. L. Garfinkel, "An evaluation of Amazons grid computing services: EC2, S3 and SQS," Center for Research on Computation and Society School for Engineering and Applied Sciences, Harvard University, Tech. Rep., 2007.
-
(2007)
An Evaluation of Amazons Grid Computing Services: EC2, S3 and SQS
-
-
Garfinkel, S.L.1
-
18
-
-
70349750047
-
The Eucalyptus Open-Source Cloud-Computing System
-
Washington, DC, USA: IEEE Computer Society, [Online]. Available
-
D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff, and D. Zagorodnov, "The Eucalyptus Open-Source Cloud-Computing System," in Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, ser. CCGRID '09. Washington, DC, USA: IEEE Computer Society, 2009, pp. 124-131. [Online]. Available: http://dx.doi.org/10. 1109/CCGRID.2009.93
-
(2009)
Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, Ser. CCGRID '09
, pp. 124-131
-
-
Nurmi, D.1
Wolski, R.2
Grzegorczyk, C.3
Obertelli, G.4
Soman, S.5
Youseff, L.6
Zagorodnov, D.7
-
19
-
-
80051985554
-
Design and Evaluation of a Real-Time URL Spam Filtering Service
-
K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song, "Design and Evaluation of a Real-Time URL Spam Filtering Service," in Proceedings of the IEEE Symposium on Security and Privacy, May 2011.
-
Proceedings of the IEEE Symposium on Security and Privacy, May 2011
-
-
Thomas, K.1
Grier, C.2
Ma, J.3
Paxson, V.4
Song, D.5
-
20
-
-
0003235833
-
Effective traffic measurement using ntop
-
May
-
L. Deri and S. Suin, "Effective traffic measurement using ntop," Communications Magazine, IEEE, vol. 38, no. 5, pp. 138 -143, May 2000.
-
(2000)
Communications Magazine, IEEE
, vol.38
, Issue.5
, pp. 138-143
-
-
Deri, L.1
Suin, S.2
|