-
6
-
-
84950249995
-
-
The New Yorker, April 2013. Accessed on 22 July
-
Bustillos, M.: The Bitcoin Boom. The New Yorker, April 2013. Accessed on 22 July 2014.
-
(2014)
The Bitcoin Boom
-
-
Bustillos, M.1
-
9
-
-
84882582017
-
An inside look at botnets
-
Christodorescu, M., Jha, S., Maughan, D., Song, D., Wang, C. (eds.),. Springer, New York
-
Barford, P., Yegneswaran, V.: An inside look at botnets. In: Christodorescu, M., Jha, S., Maughan, D., Song, D., Wang, C. (eds.) Malware Detection. Advances in Information Security, vol. 27, pp. 171-191. Springer, New York (2007).
-
(2007)
Malware Detection. Advances in Information Security
, vol.27
, pp. 171-191
-
-
Barford, P.1
Yegneswaran, V.2
-
12
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
ACM
-
Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C., Vigna, G.: Your botnet is my botnet: analysis of a botnet takeover. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS), pp. 635-647. ACM (2009).
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS)
, pp. 635-647
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
13
-
-
77952687808
-
An advanced hybrid peer-to-peer botnet
-
Wang, P., Sparks, S., Zou, C. C.: An advanced hybrid peer-to-peer botnet. IEEE Trans. Dependable Sec. Comput. 7(2), 113-127 (2010).
-
(2010)
IEEE Trans. Dependable Sec. Comput
, vol.7
, Issue.2
, pp. 113-127
-
-
Wang, P.1
Sparks, S.2
Zou, C.C.3
-
16
-
-
84950290678
-
-
Accessed on 22 July Symantec Security Response Blog, October 2009
-
Lelli, A.: Trojan. Whitewell: What's your (bot) Facebook Status Today? Symantec Security Response Blog, October 2009. http://www. symantec. com/connect/blogs/trojanwhitewell-what-s-your-bot-facebook-status-today. Accessed on 22 July 2014.
-
(2014)
Trojan. Whitewell: What's your (bot) Facebook Status Today?
-
-
Lelli, A.1
-
20
-
-
84883055523
-
-
Bitcoin Wiki. Accessed 22 July 2014
-
Protocol Specification. Bitcoin Wiki. Accessed 22 July 2014.
-
Protocol Specification
-
-
-
22
-
-
84950302908
-
-
Bitcoin Foundation, 24 October 2013. Accessed on 4 Aug
-
Andresen, G.: Core Development Update #5. Bitcoin Foundation, 24 October 2013. Accessed on 4 Aug 2014.
-
(2014)
Core Development Update #5
-
-
Andresen, G.1
-
25
-
-
84875487747
-
-
Accessed on 22 July 0. 5, January 2012
-
Willet, J. R.: The Second Bitcoin Whitepaper, v. 0. 5, January 2012. https://sites. google. com/site/2ndbtcwpaper/2ndBitcoinWhitepaper. pdf. Accessed on 22 July 2014.
-
(2014)
The Second Bitcoin Whitepaper
-
-
Willet, J.R.1
-
27
-
-
84916608100
-
Elliptic curve cryptography in practice
-
Christin, N., Safavi-Naini, R. (eds.),. Springer, Heidelberg. IACR Cryptology ePrint Archive
-
Bos, J. W., Halderman, J. A., Heninger, N., Moore, J., Naehrig, M., Wustrow, E.: Elliptic curve cryptography in practice. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 156-174. Springer, Heidelberg (2014). IACR Cryptology ePrint Archive.
-
(2014)
FC 2014. LNCS
, vol.8437
, pp. 156-174
-
-
Bos, J.W.1
Halderman, J.A.2
Heninger, N.3
Moore, J.4
Naehrig, M.5
Wustrow, E.6
-
28
-
-
84865832159
-
CommitCoin: Carbon dating commitments with bitcoin
-
Keromytis, A.D. (ed.),. Springer, Heidelberg
-
Clark, J., Essex, A.: CommitCoin: carbon dating commitments with bitcoin. In: Keromytis, A. D. (ed.) FC 2012. LNCS, vol. 7397, pp. 390-398. Springer, Heidelberg (2012).
-
(2012)
FC 2012. LNCS
, vol.7397
, pp. 390-398
-
-
Clark, J.1
Essex, A.2
-
29
-
-
0001217738
-
The prisoners problem and the subliminal channel
-
Chaum, D. (ed.),. Springer, Cambridge
-
Simmons, G. J.: The prisoners problem and the subliminal channel. In: Chaum, D. (ed.) Advances in Cryptology, pp. 51-67. Springer, Cambridge (1984).
-
(1984)
Advances in Cryptology
, pp. 51-67
-
-
Simmons, G.J.1
-
30
-
-
84985824882
-
The subliminal channel and digital signatures
-
Beth, T., Cot, N., Ingemarsson, I. (eds.),. Springer, Heidelberg
-
Simmons, G. J.: The subliminal channel and digital signatures. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 364-378. Springer, Heidelberg (1985).
-
(1985)
EUROCRYPT 1984. LNCS
, vol.209
, pp. 364-378
-
-
Simmons, G.J.1
-
34
-
-
84857255431
-
Revisiting traffic anomaly detection using software defined networking
-
Sommer, R., Balzarotti, D., Maier, G. (eds.),. Springer, Heidelberg
-
Mehdi, S. A., Khalid, J., Khayam, S. A.: Revisiting traffic anomaly detection using software defined networking. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol. 6961, pp. 161-180. Springer, Heidelberg (2011).
-
(2011)
RAID 2011. LNCS
, vol.6961
, pp. 161-180
-
-
Mehdi, S.A.1
Khalid, J.2
Khayam, S.A.3
-
35
-
-
36949007580
-
Cent, five cent, ten cent, dollar: Hitting botnets where it really hurts
-
ACM
-
Ford, R., Gordon, S.: Cent, five cent, ten cent, dollar: hitting botnets where it really hurts. In: Proceedings of the 2006 Workshop on New Security Paradigms, pp. 3-10. ACM (2006).
-
(2006)
Proceedings of the 2006 Workshop on New Security Paradigms
, pp. 3-10
-
-
Ford, R.1
Gordon, S.2
-
36
-
-
77952415099
-
An inquiry into the nature and causes of the wealth of internet miscreants
-
Franklin, J., Perrig, A., Paxson, V., Savage, S.: An inquiry into the nature and causes of the wealth of internet miscreants. In ACM Conference on Computer and Communications Security, pp. 375-388 (2007).
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 375-388
-
-
Franklin, J.1
Perrig, A.2
Paxson, V.3
Savage, S.4
-
37
-
-
77956240814
-
Botnet economics: Uncertainty matters
-
Johnson, M.E. (ed.),. Springer, New York
-
Li, Z., Liao, Q., Striegel, A.: Botnet economics: uncertainty matters. In: Johnson, M. E. (ed.) Managing Information Risk and the Economics of Security, pp. 245-267. Springer, New York (2009).
-
(2009)
Managing Information Risk and the Economics of Security
, pp. 245-267
-
-
Li, Z.1
Liao, Q.2
Striegel, A.3
-
39
-
-
85084097128
-
Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm
-
Holz, T., Steiner, M., Dahl, F., Biersack, E., Freiling, F. C.: Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm. In: Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), pp. 1-9 (2008).
-
(2008)
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)
, pp. 1-9
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.4
Freiling, F.C.5
-
40
-
-
77954925610
-
Walowdac-analysis of a peer-to-peer botnet
-
IEEE
-
Stock, B., Gobel, J., Engelberth, M., Freiling, F. C., Holz, T.: Walowdac-analysis of a peer-to-peer botnet. In: 2009 European Conference on Computer Network Defense (EC2ND), pp. 13-20. IEEE (2009).
-
(2009)
2009 European Conference on Computer Network Defense (EC2ND)
, pp. 13-20
-
-
Stock, B.1
Gobel, J.2
Engelberth, M.3
Freiling, F.C.4
Holz, T.5
-
41
-
-
84893791719
-
Highly resilient peer-to-peer botnets are here: An analysis of gameover zeus
-
IEEE
-
Andriesse, D., Rossow, C., Stone-Gross, B., Plohmann, D., Bos, H.: Highly resilient peer-to-peer botnets are here: an analysis of gameover zeus. In: 2013 8th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE), pp. 116-123. IEEE (2013).
-
(2013)
2013 8th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE)
, pp. 116-123
-
-
Andriesse, D.1
Rossow, C.2
Stone-Gross, B.3
Plohmann, D.4
Bos, H.5
-
42
-
-
84888402098
-
The zombie roundup: Understanding, detecting, and disrupting botnets
-
Cooke, E., Jahanian, F., McPherson, D.: The zombie roundup: understanding, detecting, and disrupting botnets. In: Proceedings of the USENIX SRUTI Workshop, vol. 39, p. 44 (2005).
-
(2005)
Proceedings of the USENIX SRUTI Workshop
, vol.39
, pp. 44
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
43
-
-
56549101103
-
A first step towards live botmaster traceback
-
Lippmann, R., Kirda, E., Trachtenberg, A. (eds.),. Springer, Heidelberg
-
Ramsbrock, D., Wang, X., Jiang, X.: A first step towards live botmaster traceback. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 59-77. Springer, Heidelberg (2008).
-
(2008)
RAID 2008. LNCS
, vol.5230
, pp. 59-77
-
-
Ramsbrock, D.1
Wang, X.2
Jiang, X.3
-
45
-
-
85075837457
-
Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection
-
Gu, G., Perdisci, R., Zhang, J., Lee, W. et al.: Botminer: clustering analysis of network traffic for protocol-and structure-independent botnet detection. In: USENIX Security Symposium, pp. 139-154 (2008).
-
(2008)
USENIX Security Symposium
, pp. 139-154
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
46
-
-
85061529860
-
Bothunter: Detecting malware infection through ids-driven dialog correlation
-
Gu, G., Porras, P. A., Yegneswaran, V., Fong, M. W., Lee, W.: Bothunter: detecting malware infection through ids-driven dialog correlation. USENIX Secur. 7, 1-16 (2007).
-
(2007)
USENIX Secur
, vol.7
, pp. 1-16
-
-
Gu, G.1
Porras, P.A.2
Yegneswaran, V.3
Fong, M.W.4
Lee, W.5
-
47
-
-
85084097075
-
Insights from the inside: A view of botnet management from infiltration
-
(LEET)
-
Cho, C. Y., Caballero, J., Grier, C., Paxson, V., Song, D.: Insights from the inside: a view of botnet management from infiltration. In: USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET) (2010).
-
(2010)
USENIX Workshop on Large-Scale Exploits and Emergent Threats
-
-
Cho, C.Y.1
Caballero, J.2
Grier, C.3
Paxson, V.4
Song, D.5
-
48
-
-
84901245716
-
A Taxonomy of Botnet Behavior, Detection, and Defense
-
Khattak, S., Ramay, N., Khan, K., Syed, A., Khayam, S.: A Taxonomy of Botnet Behavior, Detection, and Defense. IEEE Commun. Surv. Tutor. 16(2), 898-924 (2014).
-
(2014)
IEEE Commun. Surv. Tutor
, vol.16
, Issue.2
, pp. 898-924
-
-
Khattak, S.1
Ramay, N.2
Khan, K.3
Syed, A.4
Khayam, S.5
-
49
-
-
84875223281
-
Botnets: A survey
-
Silva, S. S. C., Silva, R. M. P., Pinto, R. C. G., Salles, R. M.: Botnets: a survey. Comput. Netw. 57(2), 378-403 (2013).
-
(2013)
Comput. Netw
, vol.57
, Issue.2
, pp. 378-403
-
-
Silva, S.S.C.1
Silva, R.M.P.2
Pinto, R.C.G.3
Salles, R.M.4
-
51
-
-
77955020947
-
Take a deep breath: A stealthy, resilient and cost-effective botnet using skype
-
Kreibich, C., Jahnke, M. (eds.),. Springer, Heidelberg
-
Nappa, A., Fattori, A., Balduzzi, M., Dell'Amico, M., Cavallaro, L.: Take a deep breath: a stealthy, resilient and cost-effective botnet using skype. In: Kreibich, C., Jahnke, M. (eds.) DIMVA 2010. LNCS, vol. 6201, pp. 81-100. Springer, Heidelberg (2010).
-
(2010)
DIMVA 2010. LNCS
, vol.6201
, pp. 81-100
-
-
Nappa, A.1
Fattori, A.2
Balduzzi, M.3
Dell'Amico, M.4
Cavallaro, L.5
-
53
-
-
80052986561
-
Stegobot: A covert social network botnet
-
Filler, T., Pevný, T., Craver, S., Ker, A. (eds.),. Springer, Heidelberg
-
Nagaraja, S., Houmansadr, A., Piyawongwisal, P., Singh, V., Agarwal, P., Borisov, N.: Stegobot: a covert social network botnet. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 299-313. Springer, Heidelberg (2011).
-
(2011)
IH 2011. LNCS
, vol.6958
, pp. 299-313
-
-
Nagaraja, S.1
Houmansadr, A.2
Piyawongwisal, P.3
Singh, V.4
Agarwal, P.5
Borisov, N.6
-
54
-
-
84860677644
-
Design of SMS commanded-and-controlled and P2Pstructured mobile botnets
-
Zeng, Y., Shin, K. G., Hu, X.: Design of SMS commanded-and-controlled and P2Pstructured mobile botnets. In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), pp. 137-148 (2012).
-
(2012)
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec)
, pp. 137-148
-
-
Zeng, Y.1
Shin, K.G.2
Hu, X.3
-
55
-
-
85060262103
-
Covert channel in the bittorrent tracker protocol
-
Rochester Institute of Technology
-
Desimone, J., Johnson, D., Yuan, B., Lutz, P.: Covert channel in the bittorrent tracker protocol. In: International Conference on Security and Management. Rochester Institute of Technology (2012). http://scholarworks. rit. edu/other/300.
-
(2012)
International Conference on Security and Management
-
-
Desimone, J.1
Johnson, D.2
Yuan, B.3
Lutz, P.4
|