-
3
-
-
7244254280
-
Spam and the social technical gap
-
Oct.
-
B. Whitworth, "Spam and the social technical gap," IEEE Computer, vol. 37, no. 10, pp. 38-45, Oct. 2004.
-
(2004)
IEEE Computer
, vol.37
, Issue.10
, pp. 38-45
-
-
Whitworth, B.1
-
4
-
-
80755169472
-
SURF: Detecting and measuring search poisoning
-
October, Illinois, USA
-
L. Lu, R. Perdisci, and W. Lee, "SURF: Detecting and Measuring Search Poisoning", CCS'11, October 2011, Illinois, USA.
-
(2011)
CCS'11
-
-
Lu, L.1
Perdisci, R.2
Lee, W.3
-
6
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
November, Illinois, USA
-
B. Stone-Grass, M. Cova, L. Cavallaro, B. Gilbert and M. Szydlowski, "Your Botnet is My Botnet: Analysis of a Botnet Takeover", CCS'09, November 2009, Illinois, USA
-
(2009)
CCS'09
-
-
Stone-Grass, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
-
7
-
-
66249147541
-
A survey of botnet technology and defenses
-
March, Washingtin DC, USA
-
M. Bailey, E. Cooke, F. Jahanian, Y. Xu and M. Karir, "A Survey of Botnet Technology and Defenses", CATCH"09, Cybersecurity Applications and Technology, March 2009, Washingtin DC, USA
-
(2009)
CATCH?09 Cybersecurity Applications and Technology
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Xu, Y.4
Karir, M.5
-
10
-
-
84897688714
-
-
Technical Report
-
J. Shi and S. Saleem, "Phishing", Technical Report, http://www.cs.arizona.edu/~collberg/Teaching/466- 566/2012/Resources/ presentations/2012/topic5-final/report.pdf
-
Phishing
-
-
Shi, J.1
Saleem, S.2
-
11
-
-
84897742503
-
-
Symantec
-
Symantec, http://www.symantec.com/index.jsp
-
-
-
-
12
-
-
84897707923
-
-
Wikipedia Last updated on 2nd December
-
Computer Security, Wikipedia, http://en.wikipedia.org/wiki/Computer- security, Last updated on 2nd December, 2013.
-
(2013)
Computer Security
-
-
-
14
-
-
84897742504
-
-
26th September
-
Data to Decisions, 26th September 2013, http://data-to-decisions.com/
-
(2013)
Data to Decisions
-
-
-
15
-
-
84883289796
-
Big data fuels intelligence-driven security
-
January
-
S. Curry, E. Kirda, E. Schwartz, W. H. Stewart, and A. Yoran, "Big Data Fuels Intelligence-Driven Security", RSA Security Brief, January, 2013
-
(2013)
RSA Security Brief
-
-
Curry, S.1
Kirda, E.2
Schwartz, E.3
Stewart, W.H.4
Yoran, A.5
-
16
-
-
84897690619
-
-
Solera Networks, http://www.soleranetworks.com/about/securityanalytics/
-
Solera Networks
-
-
-
17
-
-
84897725410
-
-
Fortscale
-
Fortscale, www.fortscale.com
-
-
-
-
19
-
-
84897689105
-
-
Cyber Security Analytics
-
Cyber Security Analytics. Prevent Intrusion Before Its Too Late: http://bigdata.pervasive.com/Solutions/Cyber-Security.aspx
-
Prevent Intrusion before Its Too Late
-
-
-
20
-
-
84897690618
-
-
Secure Analytics, http://www.juniper.net/us/en/productsservices/ security/secure-analytics/
-
Secure Analytics
-
-
-
21
-
-
84897690617
-
-
RSA Security Analytics, http://www.emc.com/security/securityanalytics/ security-analytics.htm
-
RSA Security Analytics
-
-
-
22
-
-
84897706130
-
-
LogRythm Security Analytics: http://logrhythm.com/siem-2.0/theplatform- for-security-analytics/logrhythm-security-analytics.aspx
-
LogRythm Security Analytics
-
-
-
24
-
-
84897725939
-
-
Teradata and Ponemon Institute February
-
Teradata and Ponemon Institute, Big Data Analytics in Cyber Defense, February 2013, http://www.ponemon.org/local/upload/file/Big-Data-Analytics-in- Cyber-Defense-V12.pdf
-
(2013)
Big Data Analytics in Cyber Defense
-
-
|