-
3
-
-
85077698784
-
-
Honeynet project. http://www.honeynet.org
-
Honeynet project. http://www.honeynet.org.
-
-
-
-
5
-
-
85077684772
-
-
OpenWRT Project. http://openwrt.org
-
OpenWRT Project. http://openwrt.org/.
-
-
-
-
6
-
-
78650554812
-
-
Securityfocus.com, vulnerabilities. http://www.securityfocus.com/vulnerabilities.
-
Vulnerabilities
-
-
-
7
-
-
85077686701
-
-
UMich wireless usage. http://www.itcom.itd.umich.edu/wireless/stats/yr2006/02/campus.html.
-
UMich Wireless Usage
-
-
-
8
-
-
85077693438
-
-
WEP: Dead Again. http://www.securityfocus.com/infocus/1814#aircrack.
-
WEP: Dead Again
-
-
-
11
-
-
85077674517
-
-
A year of bugs. http://bcheck.scanit.be/bcheck/page.php?name=STATS2004&page=3.
-
A Year of Bugs
-
-
-
13
-
-
85077687260
-
-
Dec
-
WMF exploitation. http://www.f-secure.com/weblog/archives/archive-122005.html, Dec. 2005.
-
(2005)
WMF Exploitation
-
-
-
14
-
-
84941105929
-
Mobile contagions: Simulation of infection and disease
-
June
-
E. Anderson, K. Eustice, S. Markstrum, M. Hanson, and P. Reiher. Mobile contagions: Simulation of infection and disease. In Symposium on Measurement, Modeling, and Simulation of Malware, June 2005.
-
(2005)
Symposium on Measurement, Modeling, and Simulation of Malware
-
-
Anderson, E.1
Eustice, K.2
Markstrum, S.3
Hanson, M.4
Reiher, P.5
-
20
-
-
33751038485
-
The final nail in wep’s coffin
-
Washington, DC, USA, IEEE Computer Society
-
A. Bittau, M. Handley, and J. Lackey. The final nail in wep’s coffin. In SP’06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P’06), pages 386–400, Washington, DC, USA, 2006. IEEE Computer Society.
-
(2006)
SP’06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P’06)
, pp. 386-400
-
-
Bittau, A.1
Handley, M.2
Lackey, J.3
-
22
-
-
0034777649
-
Intercepting mobile communications: The insecurity of 802.11
-
Rome, Italy, July
-
N. Borisov, I. Goldberg, and D.Wagner. Intercepting mobile communications: The insecurity of 802.11. In Proceedings of ACM Mobicom, Rome, Italy, July 2001.
-
(2001)
Proceedings of ACM Mobicom
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
-
23
-
-
24344441211
-
Searching for privacy: Design and implementation of a P2Penabled search engine
-
D. Martin and A. Serjantov, editors, Springer
-
S. Byers, L. F. Cranor, D. P. Kormann, and P. D. McDaniel. Searching for privacy: Design and implementation of a P2Penabled search engine. In D. Martin and A. Serjantov, editors, Privacy Enhancing Technologies, volume 3424 of Lecture Notes in Computer Science, pages 314–328. Springer, 2004.
-
(2004)
Privacy Enhancing Technologies, Volume 3424 of Lecture Notes in Computer Science
, pp. 314-328
-
-
Byers, S.1
Cranor, L.F.2
Kormann, D.P.3
McDaniel, P.D.4
-
25
-
-
26844490511
-
Requirements on worm mitigation technologies in MANETS
-
Washington, DC, USA, IEEE Computer Society
-
R. G. Cole, N. Phamdo, M. A. Rajab, and A. Terzis. Requirements on worm mitigation technologies in MANETS. In PADS ’05: Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation, pages 207–214, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
PADS ’05: Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation
, pp. 207-214
-
-
Cole, R.G.1
Phamdo, N.2
Rajab, M.A.3
Terzis, A.4
-
27
-
-
85077673415
-
-
June
-
F-Secure. Cabir worm description. http://www.f-secure.com/v-descs/cabir.shtml, June 2004.
-
(2004)
Cabir Worm Description
-
-
-
29
-
-
85077719851
-
-
Feb
-
F-Secure. Inqtana.A worm information. http://www.f-secure.com/v-descs/inqtana_a.shtml, Feb. 2006.
-
(2006)
Inqtana.A Worm Information
-
-
-
31
-
-
27944454864
-
Location privacy in mobile systems: A personalized anonymization model
-
Washington, DC, USA, IEEE Computer Society
-
B. Gedik and L. Liu. Location privacy in mobile systems: A personalized anonymization model. In ICDCS’05: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS’05), pages 620–629, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
ICDCS’05: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS’05)
, pp. 620-629
-
-
Gedik, B.1
Liu, L.2
-
32
-
-
23944520444
-
Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis
-
M. Gruteser and D. Grunwald. Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis. Mob. Netw. Appl., 10(3):315–325, 2005.
-
(2005)
Mob. Netw. Appl.
, vol.10
, Issue.3
, pp. 315-325
-
-
Gruteser, M.1
Grunwald, D.2
-
35
-
-
34247389249
-
Framework for location privacy in wireless networks
-
Hu and Wang. Framework for location privacy in wireless networks. In ACM SIGCOMM Asia Workshop, 2005.
-
(2005)
ACM SIGCOMM Asia Workshop
-
-
Hu1
Wang2
-
38
-
-
85077708389
-
-
weblog. Feb. 2006
-
B. Krebs. 2005 patch times for Firefox and Internet Explorer. Washington Post weblog. http://blog.washingtonpost.com/securityfix/2006/ 02/2005_patch_times_for%_firefox_a.html, Feb. 2006.
-
(2005)
Patch Times for Firefox and Internet Explorer
-
-
Krebs, B.1
-
39
-
-
84903658497
-
Internet explorer unsafe for 284 days in 2006
-
Jan
-
B. Krebs. Internet Explorer unsafe for 284 days in 2006. Washington Post weblog. http://blog.washingtonpost.com/securityfix/2007/01/internet_explorer_ un%safe_for_2.html, Jan. 2007.
-
(2007)
Washington Post Weblog
-
-
Krebs, B.1
-
40
-
-
18144370814
-
Mobile phones: The next frontier for hackers?
-
April
-
N. Leavitt. Mobile Phones: The Next Frontier for Hackers? IEEE Computer, 38(4), April 2005.
-
(2005)
IEEE Computer
, vol.38
, Issue.4
-
-
Leavitt, N.1
-
41
-
-
10444257160
-
Analyzing kleinberg’s (and other) small-world models
-
New York, NY, USA, ACM Press
-
C. Martel and V. Nguyen. Analyzing Kleinberg’s (and other) small-world models. In PODC’04: Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing, pages 179–188, New York, NY, USA, 2004. ACM Press.
-
(2004)
PODC’04: Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing
, pp. 179-188
-
-
Martel, C.1
Nguyen, V.2
-
42
-
-
85077724107
-
-
June Accessed on September 15th, 2006
-
R. McMillan. Researchers hack wi-fi driver to breach laptop. InfoWorld. http://www.infoworld.com/article/06/06/21/79536_HNwifibreach_1.html, June 2006. Accessed on September 15th, 2006.
-
(2006)
Researchers Hack Wi-Fi Driver to Breach Laptop
-
-
McMillan, R.1
-
45
-
-
33750325871
-
Argos: An emulator for fingerprinting zero-day attacks
-
Leuven, Belgium, April
-
G. Portokalidis, A. Slowinska, and H. Bos. Argos: an emulator for fingerprinting zero-day attacks. In Proc. ACM SIGOPS EUROSYS’2006, Leuven, Belgium, April 2006.
-
(2006)
Proc. ACM SIGOPS EUROSYS’2006
-
-
Portokalidis, G.1
Slowinska, A.2
Bos, H.3
-
46
-
-
85090433665
-
SNORT: Lightweight intrusion detection for networks
-
November software
-
M. Roesch. Snort: Lightweight intrusion detection for networks. In Proceedings of USENIX LISA, November 1999. (software available from http://www.snort.org/).
-
(1999)
Proceedings of USENIX LISA
-
-
Roesch, M.1
-
47
-
-
67649083400
-
-
Technical report, Department of Computer Science and Engineering, University of Washington
-
T. S. Saponas, J. Lester, C. Hartung, and T. Kohno. Devices That Tell On You: The Nike+iPod Sport Kit. Technical report, Department of Computer Science and Engineering, University of Washington, 2007.
-
(2007)
Devices That Tell on You: The Nike+iPod Sport Kit
-
-
Saponas, T.S.1
Lester, J.2
Hartung, C.3
Kohno, T.4
-
48
-
-
4344627335
-
The spread of the witty worm
-
July/August
-
C. Shannon and D. Moore. The Spread of the Witty Worm. IEEE Security & Privacy, 2(4):46–50, July/August 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.4
, pp. 46-50
-
-
Shannon, C.1
Moore, D.2
-
50
-
-
14944380936
-
The top speed of flash worms
-
October
-
S. Staniford, D. Moore, V. Paxson, and N. Weaver. The Top Speed of Flash Worms. In Proceedings of the ACM Workshop on Rapid Malcode (WORM), pages 33–42, October 2004.
-
(2004)
Proceedings of the ACM Workshop on Rapid Malcode (WORM)
, pp. 33-42
-
-
Staniford, S.1
Moore, D.2
Paxson, V.3
Weaver, N.4
-
52
-
-
34547218865
-
A preliminary investigation of worm infections in a bluetooth environment
-
New York, NY, USA, ACM Press
-
J. Su, K. K. W. Chan, A. G. Miklas, K. Po, A. Akhavan, S. Saroiu, E. de Lara, and A. Goel. A preliminary investigation of worm infections in a bluetooth environment. In WORM’06: Proceedings of the 4th ACM workshop on Recurring malcode, pages 9–16, New York, NY, USA, 2006. ACM Press.
-
(2006)
WORM’06: Proceedings of the 4th ACM Workshop on Recurring Malcode
, pp. 9-16
-
-
Su, J.1
Chan, K.K.W.2
Miklas, A.G.3
Po, K.4
Akhavan, A.5
Saroiu, S.6
de Lara, E.7
Goel, A.8
-
55
-
-
46049100524
-
Warkitting: The drive-by subversion of wireless home routers
-
Nov
-
A. Tsow, M. Jakobsson, L. Yang, and S. Wetzel. Warkitting: the drive-by subversion of wireless home routers. Anti-Phishing and Online Fraud, Part II Journal of Digital Forensic Practice, 1(3), Nov. 2006.
-
(2006)
Anti-Phishing and Online Fraud, Part II Journal of Digital Forensic Practice
, vol.1
, Issue.3
-
-
Tsow, A.1
Jakobsson, M.2
Yang, L.3
Wetzel, S.4
|