EMBER: a global perspective on extreme malicious behavior
暂无分享,去创建一个
[1] Michael Mitzenmacher,et al. A Brief History of Generative Models for Power Law and Lognormal Distributions , 2004, Internet Math..
[2] Kevin C. Almeroth,et al. FIRE: FInding Rogue nEtworks , 2009, 2009 Annual Computer Security Applications Conference.
[3] Robert K. Cunningham,et al. A taxonomy of computer worms , 2003, WORM '03.
[4] Michael R Hamblin,et al. CA : A Cancer Journal for Clinicians , 2011 .
[5] Christopher Krügel,et al. Your botnet is my botnet: analysis of a botnet takeover , 2009, CCS.
[6] Kang G. Shin,et al. On capturing malware dynamics in mobile power-law networks , 2008, SecureComm.
[7] Niels Provos,et al. All Your iFRAMEs Point to Us , 2008, USENIX Security Symposium.
[8] Saurabh Bagchi,et al. Modeling and automated containment of worms , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[9] Mark E. J. Newman,et al. Power-Law Distributions in Empirical Data , 2007, SIAM Rev..
[10] A. Jemal,et al. Cancer Statistics, 2009 , 2009, CA: a cancer journal for clinicians.
[11] Gang Zheng,et al. Confidence interval estimating procedures for standardized incidence rates , 2008, Comput. Stat. Data Anal..
[12] Hideki Koike,et al. STARMINE: a visualization system for cyber attacks , 2006, APVIS.
[13] Nir Kshetri,et al. Positive externality, increasing returns, and the rise in cybercrimes , 2009, Commun. ACM.
[14] Paul Sturges,et al. Access Denied: The Practice and Policy of Global Internet Filtering , 2008 .
[15] Daniel A. Keim,et al. Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats , 2007, IEEE Transactions on Visualization and Computer Graphics.
[16] Paul Barford,et al. Spatial-Temporal Characteristics of Internet Malicious Sources , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[17] Vinod Yegneswaran,et al. Internet intrusions: global characteristics and prevalence , 2003, SIGMETRICS '03.
[18] Andreas Terzis,et al. A multifaceted approach to understanding the botnet phenomenon , 2006, IMC '06.
[19] Ronald J. Deibert,et al. Access Denied: The Practice and Policy of Global Internet Filtering (Information Revolution and Global Politics) , 2008 .