-
2
-
-
33745673426
-
-
August
-
K. G. Anagnostakis, S. Sidiroglou, P. Akritidis, K. Xinidis, E. Markatos, and A. D. Keromytis. Detecting Targeted Attacks Using Shadow Honeypots. August 2005.
-
(2005)
Detecting Targeted Attacks Using Shadow Honeypots
-
-
Anagnostakis, K.G.1
Sidiroglou, S.2
Akritidis, P.3
Xinidis, K.4
Markatos, E.5
Keromytis, A.D.6
-
4
-
-
27544433210
-
Semantics-aware malware detection
-
M. Christodorescu, S. Jha, S. Seshia, D. Song, and R. Bryant. Semantics-aware malware detection. Security and Privacy, 2005 IEEE Symposium on, pages 32–46, 2005.
-
(2005)
Security and Privacy, 2005 IEEE Symposium on
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.3
Song, D.4
Bryant, R.5
-
8
-
-
14944369649
-
Characteristics of internet background radiation
-
R. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. Peterson. Characteristics of Internet background radiation. In Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement (IMC), pages 27–40, 2004.
-
(2004)
Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement (IMC)
, pp. 27-40
-
-
Pang, R.1
Yegneswaran, V.2
Barford, P.3
Paxson, V.4
Peterson, L.5
-
10
-
-
70350650307
-
-
Technical Report provos-2008a, Google Inc
-
N. Provos, P. Mavrommatis, M. A. Rajab, and F. Monrose. All Your iFrames Point To Us. Technical Report provos-2008a, Google Inc, 2008. http://research.google.com/archive/provos-2008a.pdf.
-
(2008)
All Your iFrames Point to Us
-
-
Provos, N.1
Mavrommatis, P.2
Rajab, M.A.3
Monrose, F.4
-
11
-
-
85080711655
-
The ghost in the browser analysis of web-based malware
-
N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. Modadugu. The ghost in the browser analysis of web-based malware. In Proceedings of the First Workshop on Hot Topics in Understanding Botnets (HotBots), 2007.
-
(2007)
Proceedings of the First Workshop on Hot Topics in Understanding Botnets (HotBots)
-
-
Provos, N.1
McNamee, D.2
Mavrommatis, P.3
Wang, K.4
Modadugu, N.5
-
12
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenomenon
-
Oct
-
M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis. A Multifaceted Approach to Understanding the Botnet Phenomenon. In Proceedings of ACM SIGCOMM/USENIX Internet Measurement Conference (IMC), pages 41–52, Oct., 2006.
-
(2006)
Proceedings of ACM SIGCOMM/USENIX Internet Measurement Conference (IMC)
, pp. 41-52
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
13
-
-
34047110218
-
Toward automated dynamic malware analysis using CWsandbox
-
C. Willems, T. Holz, and F. Freiling. Toward Automated Dynamic Malware Analysis Using CWSandbox. Security & Privacy Magazine, IEEE, 5(2):32–39, 2007.
-
(2007)
Security & Privacy Magazine, IEEE
, vol.5
, Issue.2
, pp. 32-39
-
-
Willems, C.1
Holz, T.2
Freiling, F.3
-
15
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
October
-
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis. In Proceedings of the 14th ACM Conference of Computer and Communication Security, October 2007.
-
(2007)
Proceedings of the 14th ACM Conference of Computer and Communication Security
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
|