Information Technology Reference
In-Depth Information
5. Leita, C., Mermoud, K., Dacier, M.: ScriptGen: An Automated Script Generation Tool for
Honeyd. In: Proceedings of the 21st Annual Computer Security Application Conference
(2005)
6. Bilge, L., Kirda, E., Kruegel, C., Balduzzi, M.: Exposure: Finding Malicious Domains using
Passive DNS Analysis. In: Proceedings of the 18th Annual Network and Distributed Sys-
tems Security Symposium (NDSS 2011), San Diego, USA (2011)
7. Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kru-
egel, C., Vigna, G.: Your Botnet is My Botnet: Analysis of a Botnet Takeover. In: Proceed-
ings of the 16th ACM Conference on Computer and Communications Security (CCS 2009),
Chicago, Illinois, USA, pp. 635-647 (2009)
8. Yadav, S., Reddy, A.L.N.: Winning with DNS Failures: Strategies for Faster Botnet Detec-
tion. In: Rajarajan, M., Piper, F., Wang, H., Kesidis, G. (eds.) SecureComm 2011. LNICST,
vol. 96, pp. 446-459. Springer, Heidelberg (2012)
9. Shin, S., Xu, Z., Gu, G.: EFFORT: Efficient and Effective Bot Malware Detection. In:
INFOCOM 2012 (2012)
 
Search WWH ::




Custom Search