All Your iFRAMEs Point to Us
暂无分享,去创建一个
Niels Provos | Fabian Monrose | Moheeb Abu Rajab | Panayiotis Mavrommatis | F. Monrose | Niels Provos | M. Rajab | P. Mavrommatis
[1] David J. Atkinson,et al. The virtual machine [power electronic conversion equipment testing] , 1998 .
[2] Víctor Pàmies,et al. Open Directory Project , 2003 .
[3] Sanjay Ghemawat,et al. MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.
[4] Angelos D. Keromytis,et al. Detecting Targeted Attacks Using Shadow Honeypots , 2005, USENIX Security Symposium.
[5] Steps to Reducing Unwanted Traffic on the Internet Workshop, SRUTI'05, Cambridge, MA, USA, July 7, 2005 , 2005, SRUTI.
[6] Farnam Jahanian,et al. The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets , 2005, SRUTI.
[7] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.
[8] Nick Feamster,et al. Revealing Botnet Membership Using DNSBL Counter-Intelligence , 2006, SRUTI.
[9] Andreas Terzis,et al. A multifaceted approach to understanding the botnet phenomenon , 2006, IMC '06.
[10] Steven D. Gribble,et al. A Crawler-based Study of Spyware in the Web , 2006, NDSS.
[11] Xuxian Jiang,et al. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities , 2006, NDSS.
[12] Vinod Yegneswaran,et al. An Inside Look at Botnets , 2007, Malware Detection.
[13] Niels Provos,et al. The Ghost in the Browser: Analysis of Web-based Malware , 2007, HotBots.
[14] Damien Deville,et al. SpyProxy: Execution-based Detection of Malicious Web Content , 2007, USENIX Security Symposium.
[15] Christopher Krügel,et al. Exploring Multiple Execution Paths for Malware Analysis , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[16] Heng Yin,et al. Dynamic Spyware Analysis , 2007, USENIX Annual Technical Conference.
[17] Stefan Savage,et al. Spamscatter: Characterizing Internet Scam Hosting Infrastructure , 2007, USENIX Security Symposium.
[18] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[19] C. Seifert. Know Your Enemy: Malicious Web Servers , 2007 .
[20] Stefan Savage,et al. An inquiry into the nature and causes of the wealth of internet miscreants , 2007, CCS '07.
[21] Vinod Yegneswaran,et al. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.
[22] Niels Provos,et al. Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware , 2008, LEET.