The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Conficker with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2009-2015 (14)
Publication types (Num. hits)
article(7) incollection(1) inproceedings(6)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 9 occurrences of 9 keywords

Results
Found 14 publication records. Showing 14 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
66Phillip A. Porras Inside risks - Reflections on Conficker. Search on Bibsonomy Commun. ACM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
65George Lawton On the Trail of the Conficker Worm. Search on Bibsonomy Computer The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Conficker, Malware, Worms, Buffer overflow, Security and privacy
33Charles P. Pfleeger Crypto: Not Just for the Defensive Team. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Morris worm, polymorphic viruses, packers, Virut, Virtob, Conficker, cryptography, cryptanalysis, encryption, malicious code, security & privacy
32Rhiannon Weaver Visualizing and Modeling the Scanning Behavior of the Conficker Botnet in the Presence of User and Network Activity. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
32Hadi Asghari, Michael Ciere, Michel J. G. van Eeten Post-Mortem of a Zombie: Conficker Cleanup After Six Years. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2015 DBLP  BibTeX  RDF
32Changwang Zhang, Shi Zhou, Benjamin M. Chain Hybrid spreading of the Internet worm Conficker. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
32Daniel Bilar, George Cybenko, John P. Murphy Adversarial Dynamics: The Conficker Case Study. Search on Bibsonomy Moving Target Defense The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
32Seungwon Shin, Guofei Gu, A. L. Narasimha Reddy, Christopher P. Lee 0001 A Large-Scale Empirical Study of Conficker. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
32Barry Irwin A network telescope perspective of the Conficker outbreak. Search on Bibsonomy ISSA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
32Aaron D. Sanders Conficker: Lessons in Secure Software and System Design. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
32Jana Dittmann, Bernhard Karpuschewski, Jana Fruth, Mathias Petzel, Richard Münder An exemplary attack scenario: threats to production engineering inspired by the Conficker worm. Search on Bibsonomy IWDE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
32Rhiannon Weaver A Probabilistic Population Study of the Conficker-C Botnet. Search on Bibsonomy PAM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
32Seungwon Shin, Guofei Gu Conficker and beyond: a large-scale empirical study. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
32Phillip A. Porras, Hassen Saïdi A Foray into Conficker's Logic and Rendezvous Points. Search on Bibsonomy LEET The full citation details ... 2009 DBLP  BibTeX  RDF
Displaying result #1 - #14 of 14 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license