|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 176 occurrences of 106 keywords
|
|
|
Results
Found 1175 publication records. Showing 1175 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
153 | Zonghua Zhang, Ruo Ando, Youki Kadobayashi |
Hardening Botnet by a Rational Botmaster. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
intrusion detection, Network security, malware, botnet |
124 | Eung Jun Cho, Jin Ho Kim, Choong Seon Hong |
Attack Model and Detection Scheme for Botnet on 6LoWPAN. |
APNOMS |
2009 |
DBLP DOI BibTeX RDF |
Botnet, 6LoWPAN, Attack Model |
109 | Brent ByungHoon Kang, Eric Chan-Tin, Christopher P. Lee 0001, James Tyra, Hun Jeong Kang, Chris Nunnery, Zachariah Wadler, Greg Sinclair, Nicholas Hopper, David Dagon, Yongdae Kim |
Towards complete node enumeration in a peer-to-peer botnet. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
infected hosts enumeration, storm, P2P, botnet |
108 | Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna |
Your botnet is my botnet: analysis of a botnet takeover. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
torpig, security, measurement, malware, botnet |
103 | Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis |
A multifaceted approach to understanding the botnet phenomenon. |
Internet Measurement Conference |
2006 |
DBLP DOI BibTeX RDF |
network security, computer security, malware, botnets |
94 | Juan Caballero, Pongsin Poosankam, Christian Kreibich, Dawn Xiaodong Song |
Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
botnet infiltration, protocol reverse engineering, binary analysis |
89 | Elizabeth Van Ruitenbeek, William H. Sanders |
Modeling Peer-to-Peer Botnets. |
QEST |
2008 |
DBLP DOI BibTeX RDF |
|
89 | Daniel Ramsbrock, Xinyuan Wang 0005, Xuxian Jiang |
A First Step towards Live Botmaster Traceback. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
88 | Hyunsang Choi, Hanwoo Lee, Heejo Lee, Hyogon Kim |
Botnet Detection by Monitoring Group Activities in DNS Traffic. |
CIT |
2007 |
DBLP DOI BibTeX RDF |
|
79 | Zhaosheng Zhu, Guohan Lu, Yan Chen 0004, Zhi (Judy) Fu, Phil Roberts, Keesook Han |
Botnet Research Survey. |
COMPSAC |
2008 |
DBLP DOI BibTeX RDF |
Survey, Botnet |
74 | W. Timothy Strayer, Robert Walsh, Carl Livadas, David E. Lapsley |
Detecting Botnets with Tight Command and Control. |
LCN |
2006 |
DBLP DOI BibTeX RDF |
|
74 | Kapil Singh, Abhinav Srivastava, Jonathon T. Giffin, Wenke Lee |
Evaluating email's feasibility for botnet command and control. |
DSN |
2008 |
DBLP DOI BibTeX RDF |
|
74 | Cliff Changchun Zou, Ryan Cunningham |
Honeypot-Aware Advanced Botnet Construction and Maintenance. |
DSN |
2006 |
DBLP DOI BibTeX RDF |
|
64 | Wei Lu 0018, Mahbod Tavallaee, Ali A. Ghorbani 0001 |
Automatic discovery of botnet communities on large-scale communication networks. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
botnet detection, machine learning, traffic classification |
64 | Abhinav Pathak, Feng Qian 0001, Y. Charlie Hu, Zhuoqing Morley Mao, Supranamaya Ranjan |
Botnet spam campaigns can be long lasting: evidence, implications, and analysis. |
SIGMETRICS/Performance |
2009 |
DBLP DOI BibTeX RDF |
distributedness, open relay, spam campaign, botnet, burstiness |
64 | Elizabeth Stinson, John C. Mitchell |
Characterizing Bots' Remote Control Behavior. |
Botnet Detection |
2008 |
DBLP DOI BibTeX RDF |
host-based, behavior-based, taint, interposition, detection, system call |
63 | David Dagon, Guofei Gu, Christopher P. Lee 0001 |
A Taxonomy of Botnet Structures. |
Botnet Detection |
2008 |
DBLP DOI BibTeX RDF |
|
63 | Anirudh Ramachandran, Nick Feamster, David Dagon |
Detecting Botnet Membership with DNSBL Counterintelligence. |
Botnet Detection |
2008 |
DBLP DOI BibTeX RDF |
|
63 | W. Timothy Strayer, David E. Lapsley, Robert Walsh, Carl Livadas |
Botnet Detection Based on Network Behavior. |
Botnet Detection |
2008 |
DBLP DOI BibTeX RDF |
|
63 | Zhichun Li, Anup Goyal, Yan Chen 0004 |
Honeynet-based Botnet Scan Traffic Analysis. |
Botnet Detection |
2008 |
DBLP DOI BibTeX RDF |
|
59 | Frédéric Giroire, Jaideep Chandrashekar, Nina Taft, Eve M. Schooler, Dina Papagiannaki |
Exploiting Temporal Persistence to Detect Covert Botnet Channels. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
59 | Bhavani Thuraisingham |
Data mining for security applications: Mining concept-drifting data streams to detect peer to peer botnet traffic. |
ISI |
2008 |
DBLP DOI BibTeX RDF |
|
59 | Carl Livadas, Robert Walsh, David E. Lapsley, W. Timothy Strayer |
Using Machine Learning Techniques to Identify Botnet Traffic. |
LCN |
2006 |
DBLP DOI BibTeX RDF |
|
50 | Anirudh Ramachandran, Nick Feamster |
Understanding the network-level behavior of spammers. |
SIGCOMM |
2006 |
DBLP DOI BibTeX RDF |
security, network management, spam, BGP, botnet |
50 | Zhichun Li, Anup Goyal, Yan Chen 0004, Vern Paxson |
Automating analysis of large-scale botnet probing events. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
global property extrapolation, scan strategy inference, situational awareness, botnet, statistical inference, honeynet |
49 | David Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Xiaodong Song, Heng Yin 0001 |
Automatically Identifying Trigger-based Behavior in Malware. |
Botnet Detection |
2008 |
DBLP DOI BibTeX RDF |
|
49 | John Bambenek, Agnes Klus |
Botnets and Proactive System Defense. |
Botnet Detection |
2008 |
DBLP DOI BibTeX RDF |
|
49 | Jason Franklin, Mark Luk, Jonathan M. McCune, Arvind Seshadri, Adrian Perrig, Leendert van Doorn |
Towards Sound Detection of Virtual Machines. |
Botnet Detection |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage |
Spamalytics: an empirical analysis of spam marketing conversion. |
Commun. ACM |
2009 |
DBLP DOI BibTeX RDF |
|
44 | Binbin Wang, Zhitang Li, Hao Tu, Jie Ma |
Measuring Peer-to-Peer Botnets Using Control Flow Stability. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
44 | Chwan-Hwa John Wu, Tong Liu |
Simulation for intrusion-resilient, DDoS-resistant authentication system (IDAS). |
SpringSim |
2008 |
DBLP DOI BibTeX RDF |
computer network defense, authentication, network security, discrete event simulation, DDoS, intrusion |
44 | Carlton R. Davis, Stephen Neville, José M. Fernandez 0001, Jean-Marc Robert 0001, John McHugh |
Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Brandon Shirley, Chad D. Mano |
A Model for Covert Botnet Communication in a Private Subnet. |
Networking |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Mitsuaki Akiyama, Takanori Kawamoto, Masayoshi Shimamura, Teruaki Yokoyama, Youki Kadobayashi, Suguru Yamaguchi |
A Proposal of Metrics for Botnet Detection Based on Its Cooperative Behavior. |
SAINT Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
44 | M. Patrick Collins, Timothy J. Shimeall, Sidney Faber, Jeff Janies, Rhiannon Weaver, Markus De Shon, Joseph B. Kadane |
Using uncleanliness to predict future botnet addresses. |
Internet Measurement Conference |
2007 |
DBLP DOI BibTeX RDF |
botnets, reputation management, blacklists |
35 | Si-Yu Huang, Ching-Hao Mao, Hahn-Ming Lee |
Fast-flux service network detection based on spatial snapshot mechanism for delay-free detection. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
fast-flux service network (FFSN), content distribution network (CDN), Botnet, Bayesian network classifier |
35 | Ricardo Villamarín-Salomón, José Carlos Brustoloni |
Bayesian bot detection based on DNS traffic similarity. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
intrusion detection, DNS, botnet, Bayesian method, bot |
35 | Huidong Jin 0001, Olivier Y. de Vel, Ke Zhang, Nianjun Liu |
Knowledge Discovery from Honeypot Data for Monitoring Malicious Attacks. |
Australasian Conference on Artificial Intelligence |
2008 |
DBLP DOI BibTeX RDF |
density-based cluster visualisation, honeypot data, Knowledge discovery, outlier detection, botnet, Internet security |
35 | Kazuya Kuwabara, Hiroaki Kikuchi, Masato Terada, Masashi Fujiwara |
Heuristics for Detecting Botnet Coordinated Attacks. |
ARES |
2010 |
DBLP DOI BibTeX RDF |
network, Botnet |
35 | Jian Gao, Yixian Yang, Kangfeng Zheng, Zhengming Hu |
Research of an Innovative P2P-Based Botnet. |
MVHI |
2010 |
DBLP DOI BibTeX RDF |
super node, ordinary node, P2P, botnet |
35 | Tao Wang, Shun-Zheng Yu |
Centralized Botnet Detection by Traffic Aggregation. |
ISPA |
2009 |
DBLP DOI BibTeX RDF |
Centralized Botnet, Command and Control(C&C), Similarity and Synchronization, Bot |
35 | Chung-Huang Yang, Kuang-Li Ting |
Fast Deployment of Botnet Detection with Traffic Monitoring. |
IIH-MSP |
2009 |
DBLP DOI BibTeX RDF |
botmaster, C&C server, ntop, botnet, bots |
30 | Dmitry G. Korzun, Andrei V. Gurtov |
A local equilibrium model for P2P resource ranking. |
SIGMETRICS Perform. Evaluation Rev. |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Bill Lin 0001, Jun (Jim) Xu, Nan Hua, Hao Wang 0006, Haiquan (Chuck) Zhao |
A randomized interleaved DRAM architecture for the maintenance of exact statistics counters. |
SIGMETRICS Perform. Evaluation Rev. |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Sipat Triukose, Zhihua Wen, Michael Rabinovich |
Content delivery networks: how big is big enough? |
SIGMETRICS Perform. Evaluation Rev. |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Alma Riska, Erik Riedel |
Evaluation of disk-level workloads at different time scales. |
SIGMETRICS Perform. Evaluation Rev. |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Justin Leonard, Shouhuai Xu, Ravi S. Sandhu |
A Framework for Understanding Botnets. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Ian Castle, Eimear Buckley |
The Automatic Discovery, Identification and Measurement of Botnets. |
SECURWARE |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Husain Husna, Santi Phithakkitnukoon, Srikanth Palla, Ram Dantu |
Behavior analysis of spam botnets. |
COMSWARE |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Napoleon Paxton, Gail-Joon Ahn, Bill Chu |
Towards Practical Framework for Collecting and Analyzing Network-Centric Attacks. |
IRI |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Su Chang, Thomas E. Daniels |
P2P botnet detection using behavior clustering & statistical tests. |
AISec |
2009 |
DBLP DOI BibTeX RDF |
machine learning, network security, anomaly detection |
29 | Felix Leder, Peter Martini |
NGBPA Next Generation BotNet Protocol Analysis. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Iván Sánchez Milara, Erno Kuusela, Sebastian Turpeinen, Juha Röning, Jukka Riekki |
Botnet-inspired architecture for interactive spaces. |
MUM |
2009 |
DBLP DOI BibTeX RDF |
architecture comparison, HCI, remote control, botnets, multimedia services, interactive spaces, IRC |
29 | Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel, Engin Kirda |
Automatically Generating Models for Botnet Detection. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Chun Wei, Alan P. Sprague, Gary Warner |
Detection of networks blocks used by the Storm Worm botnet. |
ACM Southeast Regional Conference |
2008 |
DBLP DOI BibTeX RDF |
data mining, spam, electronic mail, forensic analysis, cyber crime |
28 | Shingo Yamaguchi |
Mesa-Based Simulator of Botnet Defense System and Impact Evaluation of Botnet Infection Rates. |
ICEIC |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Dimitrios Georgoulias, Jens Myrup Pedersen, Alice Hutchings, Morten Falch, Emmanouil Vasilomanolakis |
In the Market for a Botnet? An In-Depth Analysis of Botnet-Related Listings on Darkweb Marketplaces. |
eCrime |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Koichi Kobayashi |
Markov Chain-Based Modeling of Malicious Botnet Spread for Botnet Defense Systems. |
SII |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Muhammad Aidiel Rachman Putra, Dandy Pramana Hostiadi, Tohari Ahmad |
Simultaneous Botnet Dataset Generator: A simulation tool for generating a botnet dataset with simultaneous attack characteristic. |
Softw. Impacts |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Shingo Yamaguchi, Daisuke Makihara |
On Resident Strategy for White-Hat Botnet in Botnet Defense System. |
ICCE-TW |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Xiaolu Zhang, Oren Upton, Nicole Lang Beebe, Kim-Kwang Raymond Choo |
IoT Botnet Forensics: A Comprehensive Digital Forensic Case Study on Mirai Botnet Servers. |
Digit. Investig. |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Shingo Yamaguchi |
Botnet Defense System and Its Basic Strategy Against Malicious Botnet. |
ICCE-TW |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Takashi Yamanoue |
A Botnet Detecting Infrastructure Using a Beneficial Botnet. |
SIGUCCS |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Han-Wei Hsiao, Shih-Heng Tung, Ming-Hsiang Shih, Wen-Pei Sung |
Using Botnet structure to construct the communication system of a real-time monitoring platform: Botnet structure for real-time monitoring platform. |
ICNC-FSKD |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Zainab Abaid, Dilip Sarkar, Mohamed Ali Kâafar, Sanjay Jha 0001 |
The Early Bird Gets the Botnet: A Markov Chain Based Early Warning System for Botnet Attacks. |
LCN |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Aymen Hasan Rashid Al Awadi, Bahari Belaton |
Multi-phase IRC Botnet and Botnet Behavior Detection Model. |
CoRR |
2015 |
DBLP BibTeX RDF |
|
28 | Xiang Cui, Lihua Yin, Shuyuan Jin, Zhiyu Hao, Shuhao Li |
Botnet spoofing: fighting botnet with itself. |
Secur. Commun. Networks |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Fariba Haddadi, Nur Zincir-Heywood |
Botnet Detection System Analysis on the Effect of Botnet Evolution and Feature Representation. |
GECCO (Companion) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Masood Khosroshahy, Mustafa K. Mehmet Ali, Dongyu Qiu |
Scomf and SComI botnet models: The cases of initial unhindered botnet expansion. |
CCECE |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Julian L. Rrushi, Ehsan Mokhtari, Ali A. Ghorbani 0001 |
Estimating botnet virulence within mathematical models of botnet propagation dynamics. |
Comput. Secur. |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Joan Calvet, Carlton R. Davis, José M. Fernandez 0001, Jean-Yves Marion, Pier-Luc St-Onge, Wadie Guizani, Pierre-Marc Bureau, Anil Somayaji |
The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Maryam Feily, Alireza Shahrestani, Sureswaran Ramadass |
A Survey of Botnet and Botnet Detection. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Noriaki Yoshikai, Shun-ichi Kurino, Ayako Komatsu, Daisuke Takagi, Masashi Ueda, Atsuo Inomata, Hideo Numata |
Experimental Research on Personal Awareness and Behavior for Information Security Protection. |
NBiS |
2011 |
DBLP DOI BibTeX RDF |
virus infection, DDos, normalcy bias, psychology, botnet, virtual game |
21 | Jungsuk Song, Jumpei Shimamura, Masashi Eto, Daisuke Inoue, Koji Nakao |
Correlation Analysis between Spamming Botnets and Malware Infected Hosts. |
SAINT |
2011 |
DBLP DOI BibTeX RDF |
darknet, spam, malware, honeypot, botnet, correlation analysis |
21 | Yukiko Sawaya, Ayumu Kubota, Yutaka Miyake |
Detection of Attackers in Services Using Anomalous Host Behavior Based on Traffic Flow Statistics. |
SAINT |
2011 |
DBLP DOI BibTeX RDF |
flow-based attacker detection, spam mail sending hosts, botnet, DDoS attack, NetFlow |
21 | Yan Jia 0001, Runheng Li, Liang Gan, Guangqiang Chen |
IRC Botnets' Homology Identifying Method Based on Improved LB_PAA Distance of Communication Characteristic Curves. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
dynamic time warping distance, LB_PAA, communication, botnet, homologous |
21 | Fang Yu 0002, Yinglian Xie, Qifa Ke |
SBotMiner: large scale search bot detection. |
WSDM |
2010 |
DBLP DOI BibTeX RDF |
botnet detection, search bot, search log analysis, web search, click fraud |
21 | Basil AsSadhan, José M. F. Moura, David E. Lapsley, Christine E. Jones, W. Timothy Strayer |
Detecting Botnets Using Command and Control Traffic. |
NCA |
2009 |
DBLP DOI BibTeX RDF |
Botnet detection, discrete time series analysis, periodogram, Walker large sample test, SLINGbot |
21 | Chengcui Zhang, Wei-bang Chen, Xin Chen 0001, Gary Warner |
Revealing common sources of image spam by unsupervised clustering with visual features. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
clustering, computer forensics, botnet, image spam |
21 | Yinglian Xie, Fang Yu 0002, Martín Abadi |
De-anonymizing the internet using unreliable IDs. |
SIGCOMM |
2009 |
DBLP DOI BibTeX RDF |
attack forensics, accountability, botnet, blacklist |
21 | Van-Hau Pham, Marc Dacier |
Honeypot Traces Forensics: The Observation Viewpoint Matters. |
NSS |
2009 |
DBLP DOI BibTeX RDF |
attack trace analysis, botnet detection, honeypot |
21 | Keisuke Takemori, Masahiko Fujinaga, Toshiya Sayama, Masakatsu Nishigaki |
Host-based traceback; tracking bot and C&C server. |
ICUIMC |
2009 |
DBLP DOI BibTeX RDF |
DNS reflection attack, host-based traceback, botnet, IP spoofing |
21 | Lei Liu 0021, Songqing Chen, Guanhua Yan, Zhao Zhang 0010 |
BotTracer: Execution-Based Bot-Like Malware Detection. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
virtual machine, Botnet, malware detection |
21 | Tao Peng 0002, Christopher Leckie, Kotagiri Ramamohanarao |
Survey of network-based defense mechanisms countering the DoS and DDoS problems. |
ACM Comput. Surv. |
2007 |
DBLP DOI BibTeX RDF |
DNS reflector attack, bandwidth attack, resource management, DoS, DDoS, Botnet, Internet security, IP traceback, IRC, IP spoofing, SYN flood, VoIP security |
21 | Bill McCarty |
Botnets: Big and Bigger. |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
honeypot, botnet, honeynet |
15 | Chengyu Song, Jianwei Zhuge, Xinhui Han, Zhiyuan Ye |
Preventing drive-by download via inter-module communication monitoring. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
inter-module communication, malicious script, intrusion detection, ActiveX, drive-by download |
15 | Katerina J. Argyraki, David R. Cheriton |
Scalable network-layer defense against internet bandwidth-flooding attacks. |
IEEE/ACM Trans. Netw. |
2009 |
DBLP DOI BibTeX RDF |
denial-of-service defenses, traffic filtering, network-level security and protection |
15 | Peter Likarish, Eunjin Jung |
A targeted web crawling for building malicious javascript collection. |
CIKM-DSMM |
2009 |
DBLP DOI BibTeX RDF |
malicious javascript, security, web crawling |
15 | Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent Jaeger, Patrick D. McDaniel, Thomas La Porta |
On cellular botnets: measuring the impact of malicious devices on a cellular network core. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
mobile phones, denial-of-service, telecommunications |
15 | Ryan Farley, Xinyuan Wang 0005 |
Roving Bugnet: Distributed Surveillance Threat and Mitigation. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Justin Leonard, Shouhuai Xu, Ravi S. Sandhu |
A First Step towards Characterizing Stealthy Botnets. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Claudio Mazzariello, Carlo Sansone |
Anomaly-Based Detection of IRC Botnets by Means of One-Class Support Vector Classifiers. |
ICIAP |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Tae Hwan Kim, Dong Seong Kim 0001, Sang Min Lee 0012, Jong Sou Park |
Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
Traffic visualization, Weighted moving average, Intrusion detection, Distributed Denial of Service attacks, Traffic matrix, IP spoofing |
15 | Jan Göbel, Thorsten Holz, Philipp Trinius |
Towards Proactive Spam Filtering (Extended Abstract). |
DIMVA |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Paolo Milani Comparetti, Gilbert Wondracek, Christopher Krügel, Engin Kirda |
Prospex: Protocol Specification Extraction. |
SP |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Mohammad M. Masud 0001, Jing Gao 0004, Latifur Khan, Jiawei Han 0001, Bhavani Thuraisingham |
A Multi-partition Multi-chunk Ensemble Technique to Classify Concept-Drifting Data Streams. |
PAKDD |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Lance Stout, Michael A. Murphy, Sebastien Goasguen |
Kestrel: an XMPP-based framework for many task computing applications. |
SC-MTAGS |
2009 |
DBLP DOI BibTeX RDF |
cluster, scheduling, grid, distributed, XMPP, MTC |
15 | Spyros Antonatos, Periklis Akritidis, Vinh The Lam, Kostas G. Anagnostakis |
Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
Web security, malicious software, distributed attacks |
15 | Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage |
Spamalytics: an empirical analysis of spam marketing conversion. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
unsolicited email, spam, conversion |
15 | Aurélien Francillon, Claude Castelluccia |
Code injection attacks on harvard-architecture devices. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
harvard architecture, return oriented programming, wireless sensor networks, buffer overflow, embedded devices, computer worms, code injection attacks, gadgets |
Displaying result #1 - #100 of 1175 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|