-
1
-
-
37249042508
-
-
Springer, Berlin, New York
-
G. Beliakov, A. Pradera, and T. Calvo. Aggregation Functions: A Guide for Practitioners. Springer, Berlin, New York, 2007.
-
(2007)
Aggregation Functions: A Guide for Practitioners.
-
-
Beliakov, G.1
Pradera, A.2
Calvo, T.3
-
2
-
-
42149173109
-
Using uncleanliness to predict future botnet addresses
-
New York, NY, USA, ACM
-
M. P. Collins, T. J. Shimeall, S. Faber, J. Janies, R. Weaver, M. D. Shon, and J. Kadane. Using uncleanliness to predict future botnet addresses. In IMC '07: Proc. of the 7th ACM SIGCOMM conference on Internet measurement, pages 93-104, New York, NY, USA, 2007. ACM.
-
(2007)
IMC ' 07: Proc. of the 7th ACM SIGCOMM Conference on Internet Measurement
, pp. 93-104
-
-
Collins, M.P.1
Shimeall, T.J.2
Faber, S.3
Janies, J.4
Weaver, R.5
Shon, M.D.6
Kadane, J.7
-
4
-
-
78249283520
-
An analysis of rogue AV campaigns
-
Berlin, Heidelberg, Springer-Verlag
-
M. Cova, C. Leita, O. Thonnard, A. D. Keromytis, and M. Dacier. An Analysis of Rogue AV Campaigns. In Proceedings of the 13th international conference on Recent advances in intrusion detection, RAID'10, pages 442-463, Berlin, Heidelberg, 2010. Springer-Verlag.
-
(2010)
Proceedings of the 13th International Conference on Recent Advances in Intrusion Detection, RAID'10
, pp. 442-463
-
-
Cova, M.1
Leita, C.2
Thonnard, O.3
Keromytis, A.D.4
Dacier, M.5
-
5
-
-
80053649136
-
The WOMBAT attack attribution method: Some results
-
Kolkata, India, Dec
-
M. Dacier, V. Pham, and O. Thonnard. The WOMBAT Attack Attribution Method: Some Results. In Proc. of the 5th International Conference on Information Systems Security (ICISS 2009), Kolkata, India, Dec 2009.
-
(2009)
Proc. of the 5th International Conference on Information Systems Security (ICISS 2009)
-
-
Dacier, M.1
Pham, V.2
Thonnard, O.3
-
7
-
-
51849168538
-
Behavior analysis of spam botnets
-
IEEE
-
H. Husna, S. Phithakkitnukoon, S. Palla, and R. Dantu. Behavior analysis of spam botnets. In COMSWARE, pages 246-253. IEEE, 2008.
-
(2008)
COMSWARE
, pp. 246-253
-
-
Husna, H.1
Phithakkitnukoon, S.2
Palla, S.3
Dantu, R.4
-
8
-
-
80053619333
-
-
March
-
B. Krebs. Rustock Botnet Flatlined, Spam Volumes Plummet. http://krebsonsecurity.com/2011/03/ rustock-botnet-flatlined-spam-volumes- plummet/, March 2011.
-
(2011)
-
-
Krebs, B.1
-
9
-
-
84904801371
-
An empirical study of clustering behavior of spammers and group-based anti-spam strategies
-
F. Li and M.-H. Hsieh. An empirical study of clustering behavior of spammers and group-based anti-spam strategies. In CEAS, 2006.
-
(2006)
CEAS
-
-
Li, F.1
Hsieh, M.-H.2
-
10
-
-
84904815650
-
Understanding large-scale spamming Botnets from internet edge sites
-
T. Mori, H. Esquivel, A. Akella, A. Shimoda, and S. Goto. Understanding Large-Scale Spamming Botnets From Internet Edge Sites. In CEAS, 2010.
-
(2010)
CEAS
-
-
Mori, T.1
Esquivel, H.2
Akella, A.3
Shimoda, A.4
Goto, S.5
-
12
-
-
80053650379
-
-
March
-
E. Park. Rustock Takedown's Effect on Global Spam Volume. http://www.symantec.com/connect/blogs/ rustock-takedown-s-effect-global-spam- volume, March 2011.
-
(2011)
-
-
Park, E.1
-
14
-
-
33750365498
-
Understanding the network-level behavior of spammers
-
New York, USA, ACM
-
A. Ramachandran and N. Feamster. Understanding the network-level behavior of spammers. In Proc. of the 2006 conference on applications, technologies, architectures, and protocols for computer communications, SIGCOMM '06, pages 291-302, New York, USA, 2006. ACM.
-
(2006)
Proc. of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM '06
, pp. 291-302
-
-
Ramachandran, A.1
Feamster, N.2
-
15
-
-
0042021603
-
Multidimensional scaling, tree fitting, and clustering
-
R. N. Shepard. Multidimensional scaling, tree fitting, and clustering. Science, 210:390-398, 1980.
-
(1980)
Science
, vol.210
, pp. 390-398
-
-
Shepard, R.N.1
-
16
-
-
60349102455
-
-
Malware Research
-
J. Stewart. Top Spam Botnets Exposed. Malware Research, SecureWorks, April 2008. http: //www.secureworks.com/research/threats/topbotnets/.
-
(2008)
Top Spam Botnets Exposed
-
-
Stewart, J.1
-
17
-
-
80053642014
-
-
October
-
Symantec Corporation. Symantec Report on Rogue Security Software. http://www.symantec.com/business/ theme.jsp?themeid=threatreport, October 2009.
-
(2009)
Symantec Report on Rogue Security Software
-
-
-
19
-
-
80053654181
-
-
Spam Network Shut Down. March 18
-
The Wall Street Journal. Spam Network Shut Down. http://online.wsj.com/ article/ SB10001424052748703328404576207173861008758.html, March 18, 2011.
-
(2011)
The Wall Street Journal
-
-
-
21
-
-
80053626479
-
On a multicriteria clustering approach for attack attribution
-
November
-
O. Thonnard, W. Mees, and M. Dacier. On a multicriteria clustering approach for attack attribution. SIGKDD Explor. Newsl., 12:11-20, November 2010.
-
(2010)
SIGKDD Explor. Newsl.
, vol.12
, pp. 11-20
-
-
Thonnard, O.1
Mees, W.2
Dacier, M.3
-
22
-
-
80053643539
-
Worldwide observatory of malicious behaviors and attack threats
-
May
-
WOMBAT Project. Worldwide Observatory of Malicious Behaviors and Attack Threats. Deliverable D22 (D5.2). Root Causes Analysis: Experimental Report. http://www.wombat-project.eu, May 2011.
-
(2011)
Deliverable D22 (D5.2). Root Causes Analysis: Experimental Report
-
-
-
23
-
-
65249165325
-
Spamming botnets: Signatures and characteristics
-
New York, NY, USA, ACM
-
Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov. Spamming botnets: signatures and characteristics. In Proceedings of the ACM SIGCOMM 2008 conference on Data communication, SIGCOMM '08, pages 171-182, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the ACM SIGCOMM 2008 Conference on Data Communication, SIGCOMM '08
, pp. 171-182
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
-
24
-
-
0023855863
-
On ordered weighted averaging aggregation operators in multicriteria decision-making
-
R. Yager. On ordered weighted averaging aggregation operators in multicriteria decision-making. IEEE Trans. Syst. Man Cybern., 18(1):183-190, 1988.
-
(1988)
IEEE Trans. Syst. Man Cybern.
, vol.18
, Issue.1
, pp. 183-190
-
-
Yager, R.1
|