-
1
-
-
84871477186
-
-
("Menlo Report”) for the Department of Homeland Security (DHS), Science and Technology, Cyber Security Division (CSD), December Docket DHS–2011–0074
-
“The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research” (“Menlo Report”) for the Department of Homeland Security (DHS), Science and Technology, Cyber Security Division (CSD), December 2011. Docket No. DHS–2011–0074.
-
(2011)
The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research
-
-
-
3
-
-
85075102180
-
Battling the Rustock threat, June
-
ANSELMI, D., BOSCOVICH, R., CAMPANA, T., DOERR, S., LAURICELLA, M., PETROVSKY, O., SAADE, T., AND STEWART, H. Battling the Rustock Threat, June 2011. Microsoft Security Intelligence Report Special Edition.
-
(2011)
Microsoft Security Intelligence Report Special Edition
-
-
Anselmi, D.1
Boscovich, R.2
Campana, T.3
Doerr, S.4
Lauricella, M.5
Petrovsky, O.6
Saade, T.7
Stewart, H.8
-
8
-
-
85093822270
-
A case study of the rustock rootkit and spam bot
-
Berkeley, CA, USA, USENIX Association
-
CHIANG, K., AND LLOYD, L. A case study of the rustock rootkit and spam bot. In HotBots’07: Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets (Berkeley, CA, USA, 2007), USENIX Association, pp. 10–10.
-
(2007)
HotBots’07: Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets
, pp. 10
-
-
Chiang, K.1
Lloyd, L.2
-
9
-
-
85084097075
-
Insights from the inside: A view of botnet management from infiltration
-
April
-
CHO, C. Y., CABALLERO, J., GRIER, C., PAXSON, V., AND SONG, D. Insights from the Inside: A View of Botnet Management from Infiltration. In LEET’10: Third USENIX Workshop on Large-Scale Exploits and Emergent Threats (April 2010).
-
(2010)
LEET’10: Third USENIX Workshop on Large-Scale Exploits and Emergent Threats
-
-
Cho, C.Y.1
Caballero, J.2
Grier, C.3
Paxson, V.4
Song, D.5
-
11
-
-
77955198762
-
-
May
-
DECKER, A., SANCHO, D., KHAROUNI, L., GONCHAROV, M., AND MCARDLE, R. A study of the Pushdo / Cutwail Botnet, May 2009.
-
(2009)
A Study of the Pushdo / Cutwail Botnet
-
-
Decker, A.1
Sancho, D.2
Kharouni, L.3
Goncharov, M.4
McArdle, R.5
-
13
-
-
49049107648
-
Command and control structures in malware: From handler/agent to P2P
-
login: December
-
DITTRICH, D., AND DIETRICH, S. Command and control structures in malware: From Handler/Agent to P2P. In USENIX;login: vol. 32, no. 6 (December 2007).
-
(2007)
USENIX
, vol.32
, Issue.6
-
-
Dittrich, D.1
Dietrich, S.2
-
14
-
-
77956137201
-
Active response to computer intrusions
-
Chapter 182 in
-
DITTRICH, D., AND HIMMA, K. E. Active Response to Computer Intrusions. Chapter 182 in Vol. III, Handbook of Information Security, 2005. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=790585.
-
(2005)
Handbook of Information Security
, vol.3
-
-
Dittrich, D.1
Himma, K.E.2
-
15
-
-
77956141182
-
A case study in ethical decision making regarding remote mitigation of botnets
-
Springer-Verlag
-
DITTRICH, D., LEDER, F., AND WERNER, T. A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets. In Proceedings of the 14th International Conference on Financial Cryptograpy and Data Security (2010), FC’10, Springer-Verlag, pp. 216–230.
-
Proceedings of the 14th International Conference on Financial Cryptograpy and Data Security (2010), FC’10
, pp. 216-230
-
-
Dittrich, D.1
Leder, F.2
Werner, T.3
-
19
-
-
85075109436
-
-
KIRILLOV, I. A., CHASE, M. P., BECK, D. A., AND MARTIN, R. A. The Concepts of the Malware Attribute Enumeration and Characterization (MAEC) Effort. http://maec.mitre.org/about/docs/The_MAEC_Concept.pdf, 2010.
-
(2010)
The Concepts of the Malware Attribute Enumeration and Characterization (MAEC) Effort
-
-
Kirillov, I.A.1
Chase, M.P.2
Beck, D.A.3
Martin, R.A.4
-
24
-
-
84868140159
-
-
MICROSOFT NEWS CENTER. March
-
MICROSOFT NEWS CENTER. Cracking Down on Botnets, March 2010.
-
(2010)
Cracking down on Botnets
-
-
-
29
-
-
85000701895
-
My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging
-
USENIX Association
-
RAJAB, M. A., ZARFOSS, J., MONROSE, F., AND TERZIS, A. My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging. In Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets (2007), USENIX Association, pp. 5–5.
-
(2007)
Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets
, pp. 5
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
32
-
-
84883696093
-
-
SEVERAL. June
-
SEVERAL. Conficker Working Group: Lessons Learned, June 2010.
-
(2010)
Lessons Learned
-
-
-
34
-
-
77950106995
-
The waledac protocol: The how and why
-
February
-
SINCLAIR, G., NUNNERY, C., AND KANG, B. B. The Waledac Protocol: The How and Why. In Proceedings of the 4th International Conference on Malicious and Unwanted Software (MAL-WARE) 2009 (February 2010), pp. 69–77.
-
(2010)
Proceedings of the 4th International Conference on Malicious and Unwanted Software (MAL-WARE) 2009
, pp. 69-77
-
-
Sinclair, G.1
Nunnery, C.2
Kang, B.B.3
-
37
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
November
-
STONE-GROSS, B., COVA, M., CAVALLARO, L., GILBERT, B., SZYDLOWSKI, M., KEMMERER, R., KRUEGEL, C., AND VIGNA, G. Your Botnet is My Botnet: Analysis of a Botnet Takeover. In Proceedings of the ACM CCS (November 2009).
-
(2009)
Proceedings of the ACM CCS
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
38
-
-
49049107082
-
Analysis of the storm and nugache trojans: P2p is here
-
login:. December
-
STOVER, S., DITTRICH, D., HERNANDEZ, J., AND DIETRICH, S. Analysis of the Storm and Nugache Trojans: P2P is here. In USENIX;login: vol. 32, no. 6 (December 2007).
-
(2007)
USENIX
, vol.32
, Issue.6
-
-
Stover, S.1
Dittrich, D.2
Hernandez, J.3
Dietrich, S.4
-
42
-
-
73049098066
-
-
United STATES Department OF Justice. – 13, April
-
UNITED STATES DEPARTMENT OF JUSTICE. United States v. John Does 1 – 13, April 2011.
-
(2011)
United States V. John Does
-
-
|