|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
No Growbag Graphs found.
|
|
|
Results
Found 69 publication records. Showing 69 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Matthias Neugschwandtner, Martina Lindorfer, Christian Platzer |
A View to a Kill: WebView Exploitation. |
LEET |
2013 |
DBLP BibTeX RDF |
|
1 | Chengcui Zhang, Rupak Kharel, Song Gao 0010, Jason Britt |
Image Matching for Branding Phishing Kit Images. |
LEET |
2013 |
DBLP BibTeX RDF |
|
1 | Mohammad Karami, Damon McCoy |
Understanding the Emerging Threat of DDoS-as-a-Service. |
LEET |
2013 |
DBLP BibTeX RDF |
|
1 | Vern Paxson (eds.) |
6th USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '13, Washington, D.C., USA, August 12, 2013 |
LEET |
2013 |
DBLP BibTeX RDF |
|
1 | Charles LeDoux, Arun Lakhotia, Craig Miles, Vivek Notani, Avi Pfeffer |
FuncTracker: Discovering Shared Code to Aid Malware Forensics. |
LEET |
2013 |
DBLP BibTeX RDF |
|
1 | Jason W. Clark, Damon McCoy |
There Are No Free iPads: An Analysis of Survey Scams as a Business. |
LEET |
2013 |
DBLP BibTeX RDF |
|
1 | Chuan Yue |
The Devil Is Phishing: Rethinking Web Single Sign-On Systems Security. |
LEET |
2013 |
DBLP BibTeX RDF |
|
1 | Luca Allodi |
Attacker Economics for Internet-scale Vulnerability Risk Assessment. |
LEET |
2013 |
DBLP BibTeX RDF |
|
1 | Babak Rahbarinia, Roberto Perdisci, Manos Antonakakis, David Dagon |
SinkMiner: Mining Botnet Sinkholes for Fun and Profit. |
LEET |
2013 |
DBLP BibTeX RDF |
|
1 | Alok Tongaonkar, Ram Keralapura, Antonio Nucci |
Challenges in Network Application Identification. |
LEET |
2012 |
DBLP BibTeX RDF |
|
1 | Kurt Thomas, Chris Grier, Vern Paxson |
Adapting Social Spam Infrastructure for Political Censorship. |
LEET |
2012 |
DBLP BibTeX RDF |
|
1 | Armin Büscher, Thorsten Holz |
Tracking DDoS Attacks: Insights into the Business of Disrupting the Web. |
LEET |
2012 |
DBLP BibTeX RDF |
|
1 | Paul Ferguson |
Observations on Emerging Threats. |
LEET |
2012 |
DBLP BibTeX RDF |
|
1 | Mike Samuel, Úlfar Erlingsson |
Let's Parse to Prevent Pwnage. |
LEET |
2012 |
DBLP BibTeX RDF |
|
1 | Tudor Dumitras, Petros Efstathopoulos |
Ask WINE: Are We Safer Today? Evaluating Operating System Security through Big Data Analysis. |
LEET |
2012 |
DBLP BibTeX RDF |
|
1 | Jason Britt, Brad Wardman, Alan P. Sprague, Gary Warner |
Clustering Potential Phishing Websites Using DeepMD5. |
LEET |
2012 |
DBLP BibTeX RDF |
|
1 | Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu |
Key Challenges in Defending Against Malicious Socialbots. |
LEET |
2012 |
DBLP BibTeX RDF |
|
1 | Eric Chien, Liam O'Murchu, Nicolas Falliere |
W32.Duqu: The Precursor to the Next Stuxnet. |
LEET |
2012 |
DBLP BibTeX RDF |
|
1 | Ari Juels, Ting-Fang Yen |
Sherlock Holmes and the Case of the Advanced Persistent Threat. |
LEET |
2012 |
DBLP BibTeX RDF |
|
1 | Engin Kirda (eds.) |
5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '12, San Jose, CA, USA, April 24, 2012 |
LEET |
2012 |
DBLP BibTeX RDF |
|
1 | David Dittrich |
So You Want to Take Over a Botnet... |
LEET |
2012 |
DBLP BibTeX RDF |
|
1 | Yeongung Park, Choonghyun Lee, Chanhee Lee, JiHyeog Lim, Sangchul Han, Minkyu Park, Seong-je Cho |
RGBDroid: A Novel Response-Based Approach to Android Privilege Escalation Attacks. |
LEET |
2012 |
DBLP BibTeX RDF |
|
1 | Alexandru G. Bardas, Loai Zomlot, Sathya Chandran Sundaramurthy, Xinming Ou, S. Raj Rajagopalan, Marc R. Eisenbarth |
Classification of UDP Traffic for DDoS Detection. |
LEET |
2012 |
DBLP BibTeX RDF |
|
1 | Stevens Le Blond, Pere Manils, Chaabane Abdelberi, Mohamed Ali Kâafar, Claude Castelluccia, Arnaud Legout, Walid Dabbous |
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users. |
LEET |
2011 |
DBLP BibTeX RDF |
|
1 | Brett Stone-Gross, Thorsten Holz, Gianluca Stringhini, Giovanni Vigna |
The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns. |
LEET |
2011 |
DBLP BibTeX RDF |
|
1 | Christopher Kruegel (eds.) |
4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '11, Boston, MA, USA, March 29, 2011 |
LEET |
2011 |
DBLP BibTeX RDF |
|
1 | He Liu, Kirill Levchenko, Márk Félegyházi, Christian Kreibich, Gregor Maier, Geoffrey M. Voelker |
On the Effects of Registrar-level Intervention. |
LEET |
2011 |
DBLP BibTeX RDF |
|
1 | Qian Wang, Zesheng Chen, Chao Chen 0001 |
Characterizing Internet Worm Infection Structure. |
LEET |
2011 |
DBLP BibTeX RDF |
|
1 | Jeff Green, Joshua Juen, Omid Fatemieh, Ravinder Shankesi, Dong (Kevin) Jin, Carl A. Gunter |
Reconstructing Hash Reversal based Proof of Work Schemes. |
LEET |
2011 |
DBLP BibTeX RDF |
|
1 | Xiang Cui, Binxing Fang, Lihua Yin, Xiaoyi Liu, Tianning Zang |
Andbot: Towards Advanced Mobile Botnets. |
LEET |
2011 |
DBLP BibTeX RDF |
|
1 | Mohammed I. Al-Saleh, Jedidiah R. Crandall |
Application-Level Reconnaissance: Timing Channel Attacks Against Antivirus Software. |
LEET |
2011 |
DBLP BibTeX RDF |
|
1 | Chao Zhang, Cheng Huang 0002, Keith W. Ross, David A. Maltz, Jin Li 0001 |
Inflight Modifications of Content: Who Are the Culprits? |
LEET |
2011 |
DBLP BibTeX RDF |
|
1 | Nathaniel Husted, Steven A. Myers |
Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm. |
LEET |
2011 |
DBLP BibTeX RDF |
|
1 | Youngsang Shin, Minaxi Gupta, Steven A. Myers |
The Nuts and Bolts of a Forum Spam Automator. |
LEET |
2011 |
DBLP BibTeX RDF |
|
1 | Nick Nikiforakis, Marco Balduzzi, Steven Van Acker, Wouter Joosen, Davide Balzarotti |
Exposing the Lack of Privacy in File Hosting Services. |
LEET |
2011 |
DBLP BibTeX RDF |
|
1 | Stephen Checkoway, Hovav Shacham, Eric Rescorla |
Are Text-Only Data Formats Safe? Or, Use This LaTeX Class File to Pwn Your Computer. |
LEET |
2010 |
DBLP BibTeX RDF |
|
1 | Márk Félegyházi, Christian Kreibich, Vern Paxson |
On the Potential of Proactive Domain Blacklisting. |
LEET |
2010 |
DBLP BibTeX RDF |
|
1 | Moheeb Abu Rajab, Lucas Ballard, Panayiotis Mavrommatis, Niels Provos, Xin Zhao |
The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution. |
LEET |
2010 |
DBLP BibTeX RDF |
|
1 | Willa K. Ehrlich, Anestis Karasaridis, David A. Hoeflin, Danielle Liu |
Detection of Spam Hosts and Spam Bots Using Network Flow Traffic Modeling. |
LEET |
2010 |
DBLP BibTeX RDF |
|
1 | Stevens Le Blond, Arnaud Legout, Fabrice Le Fessant, Walid Dabbous, Mohamed Ali Kâafar |
Spying the World from Your Laptop: Identifying and Profiling Content Providers and Big Downloaders in BitTorrent. |
LEET |
2010 |
DBLP BibTeX RDF |
|
1 | Chris Nunnery, Greg Sinclair, Brent ByungHoon Kang |
Tumbling Down the Rabbit Hole: Exploring the Idiosyncrasies of Botmaster Systems in a Multi-Tier Botnet Infrastructure. |
LEET |
2010 |
DBLP BibTeX RDF |
|
1 | Jack W. Stokes, Reid Andersen, Christian Seifert, Kumar Chellapilla |
WebCop: Locating Neighborhoods of Malware on the Web. |
LEET |
2010 |
DBLP BibTeX RDF |
|
1 | Kazumichi Sato, Keisuke Ishibashi, Tsuyoshi Toyono, Nobuhisa Miyake |
Extending Black Domain Name List by Using Co-occurrence Relation between DNS Queries. |
LEET |
2010 |
DBLP BibTeX RDF |
|
1 | Chia Yuan Cho, Juan Caballero, Chris Grier, Vern Paxson, Dawn Song |
Insights from the Inside: A View of Botnet Management from Infiltration. |
LEET |
2010 |
DBLP BibTeX RDF |
|
1 | Fabian Monrose, Srinivas Krishnan |
DNS Prefetching and Its Privacy Implications: When Good Things Go Bad. |
LEET |
2010 |
DBLP BibTeX RDF |
|
1 | Tobias Lauinger, Veikko Pankakoski, Davide Balzarotti, Engin Kirda |
Honeybot, Your Man in the Middle for Automated Social Engineering. |
LEET |
2010 |
DBLP BibTeX RDF |
|
1 | Michael D. Bailey (eds.) |
3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '10, San Jose, CA, USA, April 27, 2010 |
LEET |
2010 |
DBLP BibTeX RDF |
|
1 | Jose Nazario |
PhoneyC: A Virtual Client Honeypot. |
LEET |
2009 |
DBLP BibTeX RDF |
|
1 | Steven Cheung, Alfonso Valdes |
Malware Characterization through Alert Pattern Discovery. |
LEET |
2009 |
DBLP BibTeX RDF |
|
1 | Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage |
Spamcraft: An Inside Look At Spam Campaign Orchestration. |
LEET |
2009 |
DBLP BibTeX RDF |
|
1 | Michalis Polychronakis, Kostas G. Anagnostakis |
An Empirical Study of Real-world Polymorphic Code Injection Attacks. |
LEET |
2009 |
DBLP BibTeX RDF |
|
1 | Tyler Moore 0001, Richard Clayton 0001 |
Temporal Correlations between Spam and Phishing Websites. |
LEET |
2009 |
DBLP BibTeX RDF |
|
1 | Wenke Lee (eds.) |
2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '09, Boston, MA, USA, April 21, 2009 |
LEET |
2009 |
DBLP BibTeX RDF |
|
1 | Márk Jelasity, Vilmos Bilicki |
Towards Automated Detection of Peer-to-Peer Botnets: On the Limits of Local Approaches. |
LEET |
2009 |
DBLP BibTeX RDF |
|
1 | Phillip A. Porras, Hassen Saïdi |
A Foray into Conficker's Logic and Rendezvous Points. |
LEET |
2009 |
DBLP BibTeX RDF |
|
1 | Georg Wicherski |
peHash: A Novel Approach to Fast Malware Clustering. |
LEET |
2009 |
DBLP BibTeX RDF |
|
1 | Ulrich Bayer, Imam Habibi, Davide Balzarotti, Engin Kirda |
A View on Current Malware Behaviors. |
LEET |
2009 |
DBLP BibTeX RDF |
|
1 | Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage |
On the Spam Campaign Trail. |
LEET |
2008 |
DBLP BibTeX RDF |
|
1 | D. Kevin McGrath, Minaxi Gupta |
Behind Phishing: An Examination of Phisher Modi Operandi. |
LEET |
2008 |
DBLP BibTeX RDF |
|
1 | Abhinav Pathak, Y. Charlie Hu, Zhuoqing Morley Mao |
Peeking into Spammer Behavior from a Unique Vantage Point. |
LEET |
2008 |
DBLP BibTeX RDF |
|
1 | Aaron J. Burstein |
Conducting Cybersecurity Research Legally and Ethically. |
LEET |
2008 |
DBLP BibTeX RDF |
|
1 | Guanhua Yan, Zhen Xiao, Stephan J. Eidenbenz |
Catching Instant Messaging Worms with Change-Point Detection Techniques. |
LEET |
2008 |
DBLP BibTeX RDF |
|
1 | Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst W. Biersack, Felix C. Freiling |
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm. |
LEET |
2008 |
DBLP BibTeX RDF |
|
1 | Blaine Nelson, Marco Barreno, Fuching Jack Chi, Anthony D. Joseph, Benjamin I. P. Rubinstein, Udam Saini, Charles Sutton, J. Doug Tygar, Kai Xia |
Exploiting Machine Learning to Subvert Your Spam Filter. |
LEET |
2008 |
DBLP BibTeX RDF |
|
1 | Samuel T. King, Joseph A. Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, Yuanyuan Zhou 0001 |
Designing and Implementing Malicious Hardware. |
LEET |
2008 |
DBLP BibTeX RDF |
|
1 | Michalis Polychronakis, Niels Provos |
Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware. |
LEET |
2008 |
DBLP BibTeX RDF |
|
1 | Li Zhuang, John Dunagan, Daniel R. Simon, Helen J. Wang, Ivan Osipkov, J. Doug Tygar |
Characterizing Botnets from Email Spam Records. |
LEET |
2008 |
DBLP BibTeX RDF |
|
1 | Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Stefan Savage |
The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff. |
LEET |
2008 |
DBLP BibTeX RDF |
|
1 | Fabian Monrose (eds.) |
First USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '08, San Francisco, CA, USA, April 15, 2008, Proceedings |
LEET |
2008 |
DBLP BibTeX RDF |
|
Displaying result #1 - #69 of 69 (100 per page; Change: )
|
|