-
2
-
-
85077787498
-
My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging
-
ABU, M., ZARFOSS, R. J., MONROSE, F., AND TERZIS, A. My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging. In Technical Conference (2007).
-
(2007)
Technical Conference
-
-
Abu, M.1
Zarfoss, R.J.2
Monrose, F.3
Terzis, A.4
-
3
-
-
85077791346
-
-
AIRCRACK-NG. Main documentation, 2011. http://www.aircrack-ng.org/documentation.html.
-
(2011)
Main Documentation
-
-
-
5
-
-
79551482694
-
Instrumenting home networks
-
CALVERT, K. L., EDWARDS, W. K., FEAMSTER, N., GRIN-TER, R. E., DENG, Y., AND ZHOU, X. Instrumenting home networks. SIGCOMM Comput. Commun. Rev. 41 (2011), 84–89.
-
(2011)
SIGCOMM Comput. Commun. Rev.
, vol.41
, pp. 84-89
-
-
Calvert, K.L.1
Edwards, W.K.2
Feamster, N.3
Grin-Ter, R.E.4
Deng, Y.5
Zhou, X.6
-
8
-
-
48649089769
-
A taxonomy of botnet structures
-
DAGON, D., GU, G., LEE, C. P., AND LEE, W. A taxonomy of botnet structures. In Proc. of the 24th Annual Computer Security Applications Conference (ACSAC) (2007), pp. 325–339.
-
(2007)
Proc. of the 24th Annual Computer Security Applications Conference (ACSAC)
, pp. 325-339
-
-
Dagon, D.1
Gu, G.2
Lee, C.P.3
Lee, W.4
-
9
-
-
85077795652
-
Command and control structures in malware: From handler/agent to P2P
-
December
-
DITTRICH, D., AND DIETRICH, S. Command and control structures in malware: From handler/agent to P2P. In ;login: The USENIX Magazine (December 2008).
-
(2008)
Login: The USENIX Magazine
-
-
Dittrich, D.1
Dietrich, S.2
-
11
-
-
77950820631
-
Active botnet probing to identify obscure command and control channels
-
GU, G., YEGNESWARAN, V., PORRAS, P., STOLL, J., AND LEE, W. Active botnet probing to identify obscure command and control channels. In Proc. of the 25th Annual Computer Security Applications Conference (ACSAC) (2009).
-
(2009)
Proc. of the 25th Annual Computer Security Applications Conference (ACSAC)
-
-
Gu, G.1
Yegneswaran, V.2
Porras, P.3
Stoll, J.4
Lee, W.5
-
12
-
-
0038187631
-
Security problems in 802.11-based networks
-
HOUSLEY, R., AND ARBAUGH, W. Security problems in 802.11-based networks. Commun. ACM 46 (2003), 31–34.
-
(2003)
Commun. ACM
, vol.46
, pp. 31-34
-
-
Housley, R.1
Arbaugh, W.2
-
13
-
-
61649121370
-
Towards next-generation botnets
-
HUND, R., HAMANN, M., AND HOLZ, T. Towards next-generation botnets. In Proc. of the 4th European Conference on Computer Network Defense (EC2ND) (2008), pp. 33–40.
-
(2008)
Proc. of the 4th European Conference on Computer Network Defense (EC2ND)
, pp. 33-40
-
-
Hund, R.1
Hamann, M.2
Holz, T.3
-
15
-
-
79956295945
-
Social network-based botnet command-and-control: Emerging threats and countermeasures
-
KARTALTEPE, E. J., MORALES, J. A., XU, S., AND SANDHU, R. Social network-based botnet command-and-control: emerging threats and countermeasures. In Proc. of the 8th international conference on Applied cryptography and network security (ACNS) (2010), pp. 511–528.
-
(2010)
Proc. of the 8th International Conference on Applied Cryptography and Network Security (ACNS)
, pp. 511-528
-
-
Kartaltepe, E.J.1
Morales, J.A.2
Xu, S.3
Sandhu, R.4
-
16
-
-
33244491931
-
The simple economics of cybercrimes
-
KSHETRI, N. The simple economics of cybercrimes. Security Privacy, IEEE 4, 1 (2006), 33–39.
-
(2006)
Security Privacy, IEEE
, vol.4
, Issue.1
, pp. 33-39
-
-
Kshetri, N.1
-
17
-
-
85021208791
-
Wi-Fi security - WEP, WPA and WPA2
-
January
-
LEHEMBRE, G. Wi-Fi security - WEP, WPA and WPA2. Hackin9 (January 2006).
-
(2006)
Hackin9
-
-
Lehembre, G.1
-
18
-
-
85077793427
-
-
LUEG, L. Pyrit, 2011. https://code.google.com/p/pyrit/.
-
(2011)
Pyrit
-
-
Lueg, L.1
-
19
-
-
79952066459
-
Defaming botnet toolkits: A bottom-up approach to mitigating the threat
-
ORMEROD, T., WANG, L., DEBBABI, M., YOUSSEF, A., BINSALLEEH, H., BOUKHTOUTA, A., AND SINHA, P. Defaming botnet toolkits: A bottom-up approach to mitigating the threat. In Proc. of the 4th International Conference on Emerging Security Information Systems and Technologies (SECURWARE) (2010).
-
(2010)
Proc. of the 4th International Conference on Emerging Security Information Systems and Technologies (SECURWARE)
-
-
Ormerod, T.1
Wang, L.2
Debbabi, M.3
Youssef, A.4
Binsalleeh, H.5
Boukhtouta, A.6
Sinha, P.7
-
22
-
-
85077798408
-
-
RAPID7
-
RAPID7. Metasploit Framework, 2011. http://www.metasploit.com/.
-
(2011)
Metasploit Framework
-
-
-
25
-
-
77955030814
-
Evaluating bluetooth as a medium for botnet command and control
-
SINGH, K., SANGAL, S., JAIN, N., TRAYNOR, P., AND LEE, W. Evaluating bluetooth as a medium for botnet command and control. In Proc. of the 7th Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA) (2010), pp. 61–80.
-
(2010)
Proc. of the 7th Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA)
, pp. 61-80
-
-
Singh, K.1
Sangal, S.2
Jain, N.3
Traynor, P.4
Lee, W.5
-
26
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
STONE-GROSS, B., COVA, M., CAVALLARO, L., GILBERT, B., SZYDLOWSKI, M., KEMMERER, R., KRUEGEL, C., AND VI-GNA, G. Your botnet is my botnet: analysis of a botnet takeover. In Proc. of the 16th ACM conference on Computer and communications security (CCS) (2009), pp. 635–647.
-
(2009)
Proc. of the 16th ACM Conference on Computer and Communications Security (CCS)
, pp. 635-647
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vi-Gna, G.8
-
28
-
-
46049100524
-
-
TSOW, A., JAKOBSSON, M., YANG, L., AND WETZEL, S. Warkitting: the drive-by subversion of wireless home routers, 2006.
-
(2006)
Warkitting: The Drive-by Subversion of Wireless Home Routers
-
-
Tsow, A.1
Jakobsson, M.2
Yang, L.3
Wetzel, S.4
-
30
-
-
85077796521
-
Build your own UAV 2.0 - Wireless mayhem from the heavens!
-
WEIGAND, M., HAINES, B., AND KERSHAW, M. Build your own UAV 2.0 - wireless mayhem from the heavens!, 2010. Defcon 18, https://www.defcon.org/html/defcon-18/dc-18-speakers.html#Weigand.
-
(2010)
Defcon
, vol.18
-
-
Weigand, M.1
Haines, B.2
Kershaw, M.3
|