|
Conferences in DBLP
- Mike Ter Louw, Jin Soon Lim, V. N. Venkatakrishnan
Extensible Web Browser Security. [Citation Graph (0, 0)][DBLP] DIMVA, 2007, pp:1-19 [Conf]
- Christian Ludl, Sean McAllister, Engin Kirda, Christopher Kruegel
On the Effectiveness of Techniques to Detect Phishing Sites. [Citation Graph (0, 0)][DBLP] DIMVA, 2007, pp:20-39 [Conf]
- Martin Johns, Justus Winter
Protecting the Intranet Against "JavaScript Malware" and Related Attacks. [Citation Graph (0, 0)][DBLP] DIMVA, 2007, pp:40-59 [Conf]
- Eric Medvet, Alberto Bartoli
On the Effects of Learning Set Corruption in Anomaly-Based Detection of Web Defacements. [Citation Graph (0, 0)][DBLP] DIMVA, 2007, pp:60-78 [Conf]
- Krzysztof M. Brzezinski
Intrusion Detection as Passive Testing: Linguistic Support with TTCN-3 (Extended Abstract). [Citation Graph (0, 0)][DBLP] DIMVA, 2007, pp:79-88 [Conf]
- Elizabeth Stinson, John C. Mitchell
Characterizing Bots' Remote Control Behavior. [Citation Graph (0, 0)][DBLP] DIMVA, 2007, pp:89-108 [Conf]
- Jan Goebel, Thorsten Holz, Carsten Willems
Measurement and Analysis of Autonomous Spreading Malware in a University Environment. [Citation Graph (0, 0)][DBLP] DIMVA, 2007, pp:109-128 [Conf]
- Bojan Zdrnja, Nevil Brownlee, Duane Wessels
Passive Monitoring of DNS Anomalies. [Citation Graph (0, 0)][DBLP] DIMVA, 2007, pp:129-139 [Conf]
- Jon Oberheide, Manish Karir, Zhuoqing Morley Mao
Characterizing Dark DNS Behavior. [Citation Graph (0, 0)][DBLP] DIMVA, 2007, pp:140-156 [Conf]
- Min Gyung Kang, Juan Caballero, Dawn Song
Distributed Evasive Scan Techniques and Countermeasures. [Citation Graph (0, 0)][DBLP] DIMVA, 2007, pp:157-174 [Conf]
- Jaeyeon Jung, Rodolfo A. Milito, Vern Paxson
On the Adaptive Real-Time Detection of Fast-Propagating Network Worms. [Citation Graph (0, 0)][DBLP] DIMVA, 2007, pp:175-192 [Conf]
- David R. Piegdon, Lexi Pimenidis
Targeting Physically Addressable Memory. [Citation Graph (0, 0)][DBLP] DIMVA, 2007, pp:193-212 [Conf]
- Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi
Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks. [Citation Graph (0, 0)][DBLP] DIMVA, 2007, pp:213-230 [Conf]
- Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, Elli Androulaki, Angelos D. Keromytis
A Study of Malcode-Bearing Documents. [Citation Graph (0, 0)][DBLP] DIMVA, 2007, pp:231-250 [Conf]
|