-
1
-
-
58149084148
-
Automated classification and analysis of internet malware
-
M. Bailey, J. Oberheide, J. Andersen, Z. M. Mao, F. Jahanian, and J. Nazario. Automated Classification and Analysis of Internet Malware. In Symposium on Recent Advances in Intrusion Detection (RAID), 2007.
-
(2007)
Symposium on Recent Advances in Intrusion Detection (RAID)
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.M.4
Jahanian, F.5
Nazario, J.6
-
2
-
-
33748932391
-
Dynamic analysis of malicious code
-
U. Bayer, A. Moser, C. Kruegel, and E. Kirda. Dynamic Analysis of Malicious Code. Journal in Computer Virology, 2(1), 2006.
-
(2006)
Journal in Computer Virology
, vol.2
, Issue.1
-
-
Bayer, U.1
Moser, A.2
Kruegel, C.3
Kirda, E.4
-
4
-
-
0036804084
-
Defending against flooding-based distributed Denial-of-Service attacks: A tutorial
-
R. K. C. Chang. Defending Against Flooding-based Distributed Denial-of-Service Attacks: A Tutorial. IEEE Communications Magazine, 40, 2002.
-
(2002)
IEEE Communications Magazine
, vol.40
-
-
Chang, R.K.C.1
-
5
-
-
85084097075
-
Insights from the inside: A view of botnet management from infiltration
-
C. Y. Cho, J. Caballero, C. Grier, V. Paxson, and D. Song. Insights from the Inside: A View of Botnet Management from Infiltration. In USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2010.
-
(2010)
USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)
-
-
Cho, C.Y.1
Caballero, J.2
Grier, C.3
Paxson, V.4
Song, D.5
-
6
-
-
84888402098
-
The zombie roundup: Understanding, detecting, and disrupting botnets
-
E. Cooke, F. Jahanian, and D. McPherson. The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets. In USENIX Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI), 2005.
-
(2005)
USENIX Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI)
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
10
-
-
85084097128
-
Measurements and mitigation of Peer-to-Peer-based botnets: A case study on storm worm
-
T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. C. Freiling. Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm. In USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2008.
-
(2008)
USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.4
Freiling, F.C.5
-
13
-
-
85084096033
-
On the spam campaign trail
-
C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. M. Voelker, V. Paxson, and S. Savage. On the Spam Campaign Trail. In USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2008.
-
(2008)
USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)
-
-
Kreibich, C.1
Kanich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.M.5
Paxson, V.6
Savage, S.7
-
14
-
-
11144272176
-
A taxonomy of DDoS attack and DDoS defense mechanisms
-
J. Mirkovic and P. L. Reiher. A taxonomy of DDoS attack and DDoS defense mechanisms. Computer Communication Review, 34(2), 2004.
-
(2004)
Computer Communication Review
, vol.34
, Issue.2
-
-
Mirkovic, J.1
Reiher, P.L.2
-
16
-
-
0003375670
-
An analysis of using reflectors for distributed denial-of-service attacks
-
V. Paxson. An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks. Computer Communication Review, 31, 2001.
-
(2001)
Computer Communication Review
, vol.31
-
-
Paxson, V.1
-
18
-
-
85084096558
-
The nocebo effect on the web: An analysis of fake anti-virus distribution
-
M. A. Rajab, L. Ballard, P. Mavrommatis, N. Provos, and X. Zhao. The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution. In USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2010.
-
(2010)
USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)
-
-
Rajab, M.A.1
Ballard, L.2
Mavrommatis, P.3
Provos, N.4
Zhao, X.5
-
20
-
-
58449129985
-
Bitblaze: A new approach to computer security via binary analysis
-
D. Song, D. Brumley, H. Yin, J. Caballero, I. Jager, M. G. Kang, Z. Liang, N. James, P. Poosankam, and P. Saxena. BitBlaze: A New Approach to Computer Security via Binary Analysis. In International Conference on Information Systems Security (ICISS), 2008.
-
(2008)
International Conference on Information Systems Security (ICISS)
-
-
Song, D.1
Brumley, D.2
Yin, H.3
Caballero, J.4
Jager, I.5
Kang, M.G.6
Liang, Z.7
James, N.8
Poosankam, P.9
Saxena, P.10
-
22
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
B. Stone-Gross, M. Cova, L. Cavallaro, R. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna. Your Botnet is My Botnet: Analysis of a Botnet Takeover. In ACM Conference on Computer and Communications Security (CCS), 2009.
-
(2009)
ACM Conference on Computer and Communications Security (CCS)
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, R.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
24
-
-
85075106109
-
-
The Sydney Morning Herald
-
The Sydney Morning Herald. Dirty dealings and DirtJumper. http://bit.ly/A0CVYP, 2012.
-
(2012)
Dirty Dealings and DirtJumper
-
-
|