|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 9 occurrences of 9 keywords
|
|
|
Results
Found 14 publication records. Showing 14 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
66 | Phillip A. Porras |
Inside risks - Reflections on Conficker. |
Commun. ACM |
2009 |
DBLP DOI BibTeX RDF |
|
65 | George Lawton |
On the Trail of the Conficker Worm. |
Computer |
2009 |
DBLP DOI BibTeX RDF |
Conficker, Malware, Worms, Buffer overflow, Security and privacy |
33 | Charles P. Pfleeger |
Crypto: Not Just for the Defensive Team. |
IEEE Secur. Priv. |
2010 |
DBLP DOI BibTeX RDF |
Morris worm, polymorphic viruses, packers, Virut, Virtob, Conficker, cryptography, cryptanalysis, encryption, malicious code, security & privacy |
32 | Rhiannon Weaver |
Visualizing and Modeling the Scanning Behavior of the Conficker Botnet in the Presence of User and Network Activity. |
IEEE Trans. Inf. Forensics Secur. |
2015 |
DBLP DOI BibTeX RDF |
|
32 | Hadi Asghari, Michael Ciere, Michel J. G. van Eeten |
Post-Mortem of a Zombie: Conficker Cleanup After Six Years. |
USENIX Security Symposium |
2015 |
DBLP BibTeX RDF |
|
32 | Changwang Zhang, Shi Zhou, Benjamin M. Chain |
Hybrid spreading of the Internet worm Conficker. |
CoRR |
2014 |
DBLP BibTeX RDF |
|
32 | Daniel Bilar, George Cybenko, John P. Murphy |
Adversarial Dynamics: The Conficker Case Study. |
Moving Target Defense |
2013 |
DBLP DOI BibTeX RDF |
|
32 | Seungwon Shin, Guofei Gu, A. L. Narasimha Reddy, Christopher P. Lee 0001 |
A Large-Scale Empirical Study of Conficker. |
IEEE Trans. Inf. Forensics Secur. |
2012 |
DBLP DOI BibTeX RDF |
|
32 | Barry Irwin |
A network telescope perspective of the Conficker outbreak. |
ISSA |
2012 |
DBLP DOI BibTeX RDF |
|
32 | Aaron D. Sanders |
Conficker: Lessons in Secure Software and System Design. |
Inf. Secur. J. A Glob. Perspect. |
2010 |
DBLP DOI BibTeX RDF |
|
32 | Jana Dittmann, Bernhard Karpuschewski, Jana Fruth, Mathias Petzel, Richard Münder |
An exemplary attack scenario: threats to production engineering inspired by the Conficker worm. |
IWDE |
2010 |
DBLP DOI BibTeX RDF |
|
32 | Rhiannon Weaver |
A Probabilistic Population Study of the Conficker-C Botnet. |
PAM |
2010 |
DBLP DOI BibTeX RDF |
|
32 | Seungwon Shin, Guofei Gu |
Conficker and beyond: a large-scale empirical study. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
32 | Phillip A. Porras, Hassen Saïdi |
A Foray into Conficker's Logic and Rendezvous Points. |
LEET |
2009 |
DBLP BibTeX RDF |
|
Displaying result #1 - #14 of 14 (100 per page; Change: )
|
|