-
2
-
-
33750733586
-
Malware goes mobile
-
M. Hypponen, "Malware goes mobile," Scientific American, vol. 295, no. 5, pp. 70-77, 2006.
-
(2006)
Scientific American
, vol.295
, Issue.5
, pp. 70-77
-
-
Hypponen, M.1
-
4
-
-
80755164321
-
Backdoor in top iPhone games stole user data, suit claims
-
D. Goodin, "Backdoor in top iPhone games stole user data, suit claims," The Register, 2009.
-
(2009)
The Register
-
-
Goodin, D.1
-
5
-
-
34247497767
-
Smart-phone attacks and defenses
-
Nov
-
C. Guo, H. Wang, and W. Zhu, "Smart-phone attacks and defenses," in HotNets III, Nov 2004.
-
(2004)
HotNets III
-
-
Guo, C.1
Wang, H.2
Zhu, W.3
-
6
-
-
10444252457
-
Mobile phone vulnerabilities: A new generation of malware
-
Sept
-
J. Jamaluddin, N. Zotou, R. Edwards, and P. Coulton, "Mobile phone vulnerabilities: a new generation of malware," in IEEE International Symposium on Consumer Electronics, Sept 2004, pp. 199-202.
-
(2004)
IEEE International Symposium on Consumer Electronics
, pp. 199-202
-
-
Jamaluddin, J.1
Zotou, N.2
Edwards, R.3
Coulton, P.4
-
7
-
-
84886599828
-
-
Emerging cyber threats report 2012. [Online]. Available: http: //www. gtisc. gatech. edu/doc/emerging cyber threats report2012. pdf
-
Emerging Cyber Threats Report 2012
-
-
-
8
-
-
84872118819
-
An analysis of the iKee. B iPhone botnet
-
P. Porras, H. Saidi, and V. Yegneswaran, "An analysis of the iKee. B iPhone botnet," Security and Privacy in Mobile Information and Communication Systems, pp. 141-152, 2010.
-
(2010)
Security and Privacy in Mobile Information and Communication Systems
, pp. 141-152
-
-
Porras, P.1
Saidi, H.2
Yegneswaran, V.3
-
9
-
-
79960864204
-
ISAM: An iPhone stealth airborne malware
-
D. Damopoulos, G. Kambourakis, and S. Gritzalis, "iSAM: An iPhone stealth airborne malware," Future Challenges in Security and Privacy for Academia and Industry, pp. 17-28, 2011.
-
(2011)
Future Challenges in Security and Privacy for Academia and Industry
, pp. 17-28
-
-
Damopoulos, D.1
Kambourakis, G.2
Gritzalis, S.3
-
11
-
-
68649129121
-
OpenFlow: Enabling innovation in campus networks
-
N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner, "OpenFlow: enabling innovation in campus networks," Computer Communication Review, vol. 38, no. 2, pp. 69-74, 2008.
-
(2008)
Computer Communication Review
, vol.38
, Issue.2
, pp. 69-74
-
-
McKeown, N.1
Anderson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
Shenker, S.7
Turner, J.8
-
12
-
-
84878368035
-
Dissecting Android malware: Characterization and evolution
-
May
-
Y. Zhou and X. Jiang, "Dissecting Android malware: Characterization and evolution," in IEEE Symposium on Security and Privacy, May 2012, pp. 95-109.
-
(2012)
IEEE Symposium on Security and Privacy
, pp. 95-109
-
-
Zhou, Y.1
Jiang, X.2
-
13
-
-
84870904162
-
Network performance of smart mobile handhelds in a university campus WiFi network
-
Nov
-
X. Chen, R. Jin, K. Suh, B. Wang, and W. Wei, "Network performance of smart mobile handhelds in a university campus WiFi network," in Proceedings of the Internet Measurement Conference, Nov 2012, pp. 315-328.
-
(2012)
Proceedings of the Internet Measurement Conference
, pp. 315-328
-
-
Chen, X.1
Jin, R.2
Suh, K.3
Wang, B.4
Wei, W.5
-
15
-
-
84886593020
-
-
Directory of malicious IPs. [Online]. Available: http://www. projecthoneypot. org/list of ips. php
-
Directory of Malicious IPs
-
-
-
16
-
-
35048831757
-
Fast detection of scanning worm infections
-
Springer, Sept
-
S. Schechter, J. Jung, and A. Berger, "Fast detection of scanning worm infections," in Recent Advances in Intrusion Detection (RAID). Springer, Sept 2004, pp. 59-81.
-
(2004)
Recent Advances in Intrusion Detection (RAID)
, pp. 59-81
-
-
Schechter, S.1
Jung, J.2
Berger, A.3
-
21
-
-
84913526086
-
-
Pantou: OpenFlow 1. 0 for OpenWrt. [Online]. Available: http://www. openflow. org/wk/index. php/Pantou: OpenFlow 1. 0 for OpenWrt
-
Pantou: OpenFlow 1. 0 for OpenWrt
-
-
-
22
-
-
84886582762
-
-
OpenWrt. [Online]. Available: https://openwrt. org/
-
-
-
-
23
-
-
84886590779
-
-
CBench. [Online]. Available: http://sourceforge. net/apps/trac/cbench
-
-
-
-
25
-
-
84886596628
-
-
Omni. [Online]. Available: http://trac. gpolab. bbn. com/gcf/wiki/Omni
-
-
-
-
27
-
-
84866495640
-
Separating authentication, access and accounting: A case study with OpenWiFi
-
Tech. Rep.
-
K. Yap, Y. Yiakoumis, M. Kobayashi, S. Katti, G. Parulkar, and N. McKeown, "Separating authentication, access and accounting: A case study with OpenWiFi," Open Networking Foundation, Tech. Rep., 2011.
-
(2011)
Open Networking Foundation
-
-
Yap, K.1
Yiakoumis, Y.2
Kobayashi, M.3
Katti, S.4
Parulkar, G.5
McKeown, N.6
-
28
-
-
84881314509
-
Pushing enterprise security down the network stack
-
Tech. Rep.
-
R. Clark, N. Feamster, A. Nayak, and A. Reimers, "Pushing enterprise security down the network stack," Georgia Institute of Technology, Tech. Rep., 2009.
-
(2009)
Georgia Institute of Technology
-
-
Clark, R.1
Feamster, N.2
Nayak, A.3
Reimers, A.4
-
30
-
-
85077681170
-
A crawler-based study of spyware on the web
-
Feb
-
A. Moshchuk, T. Bragin, S. Gribble, and H. Levy, "A crawler-based study of spyware on the web," in Proceedings of the Network and Distributed System Security Symposium, Feb 2006, pp. 17-33.
-
(2006)
Proceedings of the Network and Distributed System Security Symposium
, pp. 17-33
-
-
Moshchuk, A.1
Bragin, T.2
Gribble, S.3
Levy, H.4
-
31
-
-
80053650188
-
All your iFRAMEs point to us
-
Jul
-
N. Provos, P. Mavrommatis, M. A. Rajab, and F. Monrose, "All your iFRAMEs point to us," in Proceedings of the 17th conference on Security Symposium, Jul 2008, pp. 1-15.
-
(2008)
Proceedings of the 17th Conference on Security Symposium
, pp. 1-15
-
-
Provos, N.1
Mavrommatis, P.2
Rajab, M.A.3
Monrose, F.4
-
32
-
-
61649123904
-
Characterizing the IRC-based botnet phenomenon
-
Tech. Rep., Dec.
-
J. Zhuge, T. Holz, X. Han, J. Guo, and W. Zou, "Characterizing the IRC-based Botnet Phenomenon," Reihne Informatik, Tech. Rep., Dec. 2007.
-
(2007)
Reihne Informatik
-
-
Zhuge, J.1
Holz, T.2
Han, X.3
Guo, J.4
Zou, W.5
-
34
-
-
85093872656
-
Wide-scale botnet detection and characterization
-
A. Karasaridis, B. Rexroad, and D. Hoeflin, "Wide-scale botnet detection and characterization," in Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, 2007, pp. 7-7.
-
(2007)
Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets
, pp. 7-7
-
-
Karasaridis, A.1
Rexroad, B.2
Hoeflin, D.3
-
35
-
-
84888331381
-
PiOS: Detecting privacy leaks in iOS applications
-
Feb
-
M. Egele, C. Kruegel, E. Kirda, and G. Vigna, "PiOS: Detecting privacy leaks in iOS applications," in Proceedings of the Network and Distributed System Security Symposium, Feb 2011.
-
(2011)
Proceedings of the Network and Distributed System Security Symposium
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Vigna, G.4
|