-
2
-
-
84871152682
-
-
School of Computer Science, University of Massachusetts Amherst.
-
UMass Trace Repository. School of Computer Science, University of Massachusetts Amherst. http://traces. cs. umass. edu.
-
UMass Trace Repository
-
-
-
4
-
-
78751473146
-
Friends of an enemy: Identifying local members of peer-to-peer botnets using mutual contacts
-
B. Coskun, S. Dietrich, and N. Memon. Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts. In 26th Annual Computer Security Applications Conference, ACSAC '10, pages 131-140, 2010.
-
(2010)
26th Annual Computer Security Applications Conference, ACSAC '10
, pp. 131-140
-
-
Coskun, B.1
Dietrich, S.2
Memon, N.3
-
5
-
-
58149091623
-
Discovery techniques for p2p botnets
-
revision of 21 April 2009, Stevens Institute of Technology
-
D. Dittrich and S. Dietrich. Discovery techniques for p2p botnets. Technical Report CS 2008-4, revision of 21 April 2009, Stevens Institute of Technology, 2009.
-
(2009)
Technical Report CS 2008-4
-
-
Dittrich, D.1
Dietrich, S.2
-
7
-
-
79956034020
-
Bottrack: Tracking botnets using netflow and pagerank
-
Springer
-
J. Francois, S. Wang, R. State, and T. Engel. Bottrack: Tracking botnets using netflow and pagerank. In Networking 2011, LNCS 6640, pages 1-14. Springer, 2011.
-
(2011)
Networking 2011, LNCS
, vol.6640
, pp. 1-14
-
-
Francois, J.1
Wang, S.2
State, R.3
Engel, T.4
-
8
-
-
85075837457
-
BotMiner: Clustering analysis of network traffic for protocol-and structure-independent botnet detection
-
G. Gu, R. Perdisci, J. Zhang, and W. Lee. BotMiner: clustering analysis of network traffic for protocol-and structure-independent botnet detection. In 17th USENIX Security symposium, pages 139-154, 2008.
-
(2008)
17th USENIX Security Symposium
, pp. 139-154
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
9
-
-
33847303101
-
BLINC: Multilevel traffic classification in the dark
-
T. Karagiannis, K. Papagiannaki, and M. Faloutsos. BLINC: multilevel traffic classification in the dark. In SIGCOMM, pages 229-240, 2005.
-
(2005)
SIGCOMM
, pp. 229-240
-
-
Karagiannis, T.1
Papagiannaki, K.2
Faloutsos, M.3
-
11
-
-
85059753615
-
Botgrep: Finding p2p bots with structured graph analysis
-
S. Nagaraja, P. Mittal, C.-Y. Hong, M. Caesar, and N. Borisov. Botgrep: finding p2p bots with structured graph analysis. In 19th USENIX conference on Security, USENIX Security'10, pages 7-7, 2010.
-
(2010)
19th USENIX Conference on Security, USENIX Security'10
, pp. 7-7
-
-
Nagaraja, S.1
Mittal, P.2
Hong, C.-Y.3
Caesar, M.4
Borisov, N.5
-
12
-
-
69749127506
-
Models of privacy preserving traffic tunneling
-
Sept.
-
D. M. Nicol and N. Schear. Models of privacy preserving traffic tunneling. Simulation, 85(9):589-607, Sept. 2009.
-
(2009)
Simulation
, vol.85
, Issue.9
, pp. 589-607
-
-
Nicol, D.M.1
Schear, N.2
-
15
-
-
36949010345
-
Scan: A structural clustering algorithm for networks
-
X. Xu, N. Yuruk, Z. Feng, and T. A. J. Schweiger. Scan: a structural clustering algorithm for networks. In 13th ACM SIGKDD int. conf. on Knowledge discovery and data mining, KDD '07, pages 824-833, 2007.
-
(2007)
13th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, KDD '07
, pp. 824-833
-
-
Xu, X.1
Yuruk, N.2
Feng, Z.3
Schweiger, T.A.J.4
|