-
1
-
-
85076271821
-
-
milw0rm.com. http://www.milw0rm.com/.
-
-
-
-
3
-
-
85076268508
-
-
Project Honey Pot. http://www.projecthoneypot.org/home.php.
-
-
-
-
6
-
-
84885679117
-
Vigilante: End-to-end containment of Internet worms
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: End-to-end containment of Internet worms. In the 12th ACM Symposium on Operating Systems Principles (SOSP), 2005.
-
(2005)
The 12th ACM Symposium on Operating Systems Principles (SOSP)
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
8
-
-
51449100235
-
An evaluation of how search engines respond to Greek language queries
-
E. N. Efthimiadis, N. Malevris, A. Kousaridas, A. Lepeniotou, and N. Loutas. An evaluation of how search engines respond to greek language queries. In HICSS, 2008.
-
(2008)
HICSS
-
-
Efthimiadis, E.N.1
Malevris, N.2
Kousaridas, A.3
Lepeniotou, A.4
Loutas, N.5
-
11
-
-
34548041192
-
Dryad: Distributed data-parallel programs from sequential building blocks
-
M. Isard, M. Budiu, Y. Yu, A. Birrell, and D. Fetterly. Dryad: Distributed data-parallel programs from sequential building blocks. In European Conference on Computer Systems (EuroSys), 2007.
-
(2007)
European Conference on Computer Systems (EuroSys)
-
-
Isard, M.1
Budiu, M.2
Yu, Y.3
Birrell, A.4
Fetterly, D.5
-
14
-
-
17544394392
-
Computer security in the real world
-
June
-
B. W. Lampson. Computer security in the real world. IEEE Computer, 37(6):37–46, June 2004.
-
(2004)
IEEE Computer
, vol.37
, Issue.6
, pp. 37-46
-
-
Lampson, B.W.1
-
15
-
-
33751064824
-
Hamsa: Fast signature generation for zero-day polymorphic worm with provable attack resilience
-
Z. Li, M. Sanghi, Y. Chen, M.-Y. Kao, and B. Chavez. Hamsa: Fast signature generation for zero-day polymorphic worm with provable attack resilience. In IEEE Symposium on Security and Privacy, 2006.
-
(2006)
IEEE Symposium on Security and Privacy
-
-
Li, Z.1
Sanghi, M.2
Chen, Y.3
Kao, M.-Y.4
Chavez, B.5
-
19
-
-
84893520306
-
A quantitative study of forum spamming using context based analysis
-
Y. Niu, Y. Wang, H. Chen, M. Ma, and F. Hsu. A quantitative study of forum spamming using context based analysis. In Network and Distributed System Security (NDSS) Symposium, 2007.
-
(2007)
Network and Distributed System Security (NDSS) Symposium
-
-
Niu, Y.1
Wang, Y.2
Chen, H.3
Ma, M.4
Hsu, F.5
-
23
-
-
58449122201
-
Spamming botnets: Signatures and characteristics
-
Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov. Spamming botnets: Signatures and characteristics. In SIGCOMM, 2008.
-
(2008)
SIGCOMM
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
-
26
-
-
70350591395
-
Dryadlinq: A system for general-purpose distributed data-parallel computing using a high-level language
-
Y. Yu, M. Isard, D. Fetterly, M. Budiu, Ú. Erlingsson, P. K. Gunda, and J. Currey. DryadLINQ: A system for general-purpose distributed data-parallel computing using a high-level language. In Operating Systems Design and Implementation (OSDI), 2008.
-
(2008)
Operating Systems Design and Implementation (OSDI)
-
-
Yu, Y.1
Isard, M.2
Fetterly, D.3
Budiu, M.4
Erlingsson, Ú.5
Gunda, P.K.6
Currey, J.7
|