A Systematic Characterization of IM Threats using Honeypots
暂无分享,去创建一个
[1] David Lee,et al. Coping with Instant Messaging Worms - Statistical Modeling and Analysis , 2007, 2007 15th IEEE Workshop on Local & Metropolitan Area Networks.
[2] Andrew Byde,et al. Virus Throttling for Instant Messaging , 2004 .
[3] Mohammad Mannan. Secure Public Instant Messaging: A Survey † , 2004 .
[4] Herbert Bos,et al. Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation , 2006, EuroSys.
[5] Niels Provos,et al. All Your iFRAMEs Point to Us , 2008, USENIX Security Symposium.
[6] Zhenyu Wu,et al. HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[7] N. Hindocha. Threats to Instant Messaging , 2003 .
[8] David Lee,et al. Defending against Instant Messaging Worms , 2006 .
[9] Paul C. van Oorschot,et al. Secure Public Instant Messaging , 2004, PST.
[10] Na Li,et al. Detecting and filtering instant messaging spam - a global and personalized approach , 2005, 1st IEEE ICNP Workshop on Secure Network Protocols, 2005. (NPSec)..
[11] Jure Leskovec,et al. Planetary-scale views on a large instant-messaging network , 2008, WWW.
[12] John Langford,et al. Telling humans and computers apart automatically , 2004, CACM.
[13] Sven Krasser,et al. Analyzing Network and Content Characteristics of Spim Using Honeypots , 2007, SRUTI.