The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "LEET"( http://dblp.L3S.de/Venues/LEET )

URL (DBLP): http://dblp.uni-trier.de/db/conf/leet

Publication years (Num. hits)
2008-2009 (22) 2010-2011 (24) 2012-2013 (23)
Publication types (Num. hits)
inproceedings(63) proceedings(6)
Venues (Conferences, Journals, ...)
LEET(69)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 69 publication records. Showing 69 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Matthias Neugschwandtner, Martina Lindorfer, Christian Platzer A View to a Kill: WebView Exploitation. Search on Bibsonomy LEET The full citation details ... 2013 DBLP  BibTeX  RDF
1Chengcui Zhang, Rupak Kharel, Song Gao 0010, Jason Britt Image Matching for Branding Phishing Kit Images. Search on Bibsonomy LEET The full citation details ... 2013 DBLP  BibTeX  RDF
1Mohammad Karami, Damon McCoy Understanding the Emerging Threat of DDoS-as-a-Service. Search on Bibsonomy LEET The full citation details ... 2013 DBLP  BibTeX  RDF
1Vern Paxson (eds.) 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '13, Washington, D.C., USA, August 12, 2013 Search on Bibsonomy LEET The full citation details ... 2013 DBLP  BibTeX  RDF
1Charles LeDoux, Arun Lakhotia, Craig Miles, Vivek Notani, Avi Pfeffer FuncTracker: Discovering Shared Code to Aid Malware Forensics. Search on Bibsonomy LEET The full citation details ... 2013 DBLP  BibTeX  RDF
1Jason W. Clark, Damon McCoy There Are No Free iPads: An Analysis of Survey Scams as a Business. Search on Bibsonomy LEET The full citation details ... 2013 DBLP  BibTeX  RDF
1Chuan Yue The Devil Is Phishing: Rethinking Web Single Sign-On Systems Security. Search on Bibsonomy LEET The full citation details ... 2013 DBLP  BibTeX  RDF
1Luca Allodi Attacker Economics for Internet-scale Vulnerability Risk Assessment. Search on Bibsonomy LEET The full citation details ... 2013 DBLP  BibTeX  RDF
1Babak Rahbarinia, Roberto Perdisci, Manos Antonakakis, David Dagon SinkMiner: Mining Botnet Sinkholes for Fun and Profit. Search on Bibsonomy LEET The full citation details ... 2013 DBLP  BibTeX  RDF
1Alok Tongaonkar, Ram Keralapura, Antonio Nucci Challenges in Network Application Identification. Search on Bibsonomy LEET The full citation details ... 2012 DBLP  BibTeX  RDF
1Kurt Thomas, Chris Grier, Vern Paxson Adapting Social Spam Infrastructure for Political Censorship. Search on Bibsonomy LEET The full citation details ... 2012 DBLP  BibTeX  RDF
1Armin Büscher, Thorsten Holz Tracking DDoS Attacks: Insights into the Business of Disrupting the Web. Search on Bibsonomy LEET The full citation details ... 2012 DBLP  BibTeX  RDF
1Paul Ferguson Observations on Emerging Threats. Search on Bibsonomy LEET The full citation details ... 2012 DBLP  BibTeX  RDF
1Mike Samuel, Úlfar Erlingsson Let's Parse to Prevent Pwnage. Search on Bibsonomy LEET The full citation details ... 2012 DBLP  BibTeX  RDF
1Tudor Dumitras, Petros Efstathopoulos Ask WINE: Are We Safer Today? Evaluating Operating System Security through Big Data Analysis. Search on Bibsonomy LEET The full citation details ... 2012 DBLP  BibTeX  RDF
1Jason Britt, Brad Wardman, Alan P. Sprague, Gary Warner Clustering Potential Phishing Websites Using DeepMD5. Search on Bibsonomy LEET The full citation details ... 2012 DBLP  BibTeX  RDF
1Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu Key Challenges in Defending Against Malicious Socialbots. Search on Bibsonomy LEET The full citation details ... 2012 DBLP  BibTeX  RDF
1Eric Chien, Liam O'Murchu, Nicolas Falliere W32.Duqu: The Precursor to the Next Stuxnet. Search on Bibsonomy LEET The full citation details ... 2012 DBLP  BibTeX  RDF
1Ari Juels, Ting-Fang Yen Sherlock Holmes and the Case of the Advanced Persistent Threat. Search on Bibsonomy LEET The full citation details ... 2012 DBLP  BibTeX  RDF
1Engin Kirda (eds.) 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '12, San Jose, CA, USA, April 24, 2012 Search on Bibsonomy LEET The full citation details ... 2012 DBLP  BibTeX  RDF
1David Dittrich So You Want to Take Over a Botnet... Search on Bibsonomy LEET The full citation details ... 2012 DBLP  BibTeX  RDF
1Yeongung Park, Choonghyun Lee, Chanhee Lee, JiHyeog Lim, Sangchul Han, Minkyu Park, Seong-je Cho RGBDroid: A Novel Response-Based Approach to Android Privilege Escalation Attacks. Search on Bibsonomy LEET The full citation details ... 2012 DBLP  BibTeX  RDF
1Alexandru G. Bardas, Loai Zomlot, Sathya Chandran Sundaramurthy, Xinming Ou, S. Raj Rajagopalan, Marc R. Eisenbarth Classification of UDP Traffic for DDoS Detection. Search on Bibsonomy LEET The full citation details ... 2012 DBLP  BibTeX  RDF
1Stevens Le Blond, Pere Manils, Chaabane Abdelberi, Mohamed Ali Kâafar, Claude Castelluccia, Arnaud Legout, Walid Dabbous One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users. Search on Bibsonomy LEET The full citation details ... 2011 DBLP  BibTeX  RDF
1Brett Stone-Gross, Thorsten Holz, Gianluca Stringhini, Giovanni Vigna The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns. Search on Bibsonomy LEET The full citation details ... 2011 DBLP  BibTeX  RDF
1Christopher Kruegel (eds.) 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '11, Boston, MA, USA, March 29, 2011 Search on Bibsonomy LEET The full citation details ... 2011 DBLP  BibTeX  RDF
1He Liu, Kirill Levchenko, Márk Félegyházi, Christian Kreibich, Gregor Maier, Geoffrey M. Voelker On the Effects of Registrar-level Intervention. Search on Bibsonomy LEET The full citation details ... 2011 DBLP  BibTeX  RDF
1Qian Wang, Zesheng Chen, Chao Chen 0001 Characterizing Internet Worm Infection Structure. Search on Bibsonomy LEET The full citation details ... 2011 DBLP  BibTeX  RDF
1Jeff Green, Joshua Juen, Omid Fatemieh, Ravinder Shankesi, Dong (Kevin) Jin, Carl A. Gunter Reconstructing Hash Reversal based Proof of Work Schemes. Search on Bibsonomy LEET The full citation details ... 2011 DBLP  BibTeX  RDF
1Xiang Cui, Binxing Fang, Lihua Yin, Xiaoyi Liu, Tianning Zang Andbot: Towards Advanced Mobile Botnets. Search on Bibsonomy LEET The full citation details ... 2011 DBLP  BibTeX  RDF
1Mohammed I. Al-Saleh, Jedidiah R. Crandall Application-Level Reconnaissance: Timing Channel Attacks Against Antivirus Software. Search on Bibsonomy LEET The full citation details ... 2011 DBLP  BibTeX  RDF
1Chao Zhang, Cheng Huang 0002, Keith W. Ross, David A. Maltz, Jin Li 0001 Inflight Modifications of Content: Who Are the Culprits? Search on Bibsonomy LEET The full citation details ... 2011 DBLP  BibTeX  RDF
1Nathaniel Husted, Steven A. Myers Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm. Search on Bibsonomy LEET The full citation details ... 2011 DBLP  BibTeX  RDF
1Youngsang Shin, Minaxi Gupta, Steven A. Myers The Nuts and Bolts of a Forum Spam Automator. Search on Bibsonomy LEET The full citation details ... 2011 DBLP  BibTeX  RDF
1Nick Nikiforakis, Marco Balduzzi, Steven Van Acker, Wouter Joosen, Davide Balzarotti Exposing the Lack of Privacy in File Hosting Services. Search on Bibsonomy LEET The full citation details ... 2011 DBLP  BibTeX  RDF
1Stephen Checkoway, Hovav Shacham, Eric Rescorla Are Text-Only Data Formats Safe? Or, Use This LaTeX Class File to Pwn Your Computer. Search on Bibsonomy LEET The full citation details ... 2010 DBLP  BibTeX  RDF
1Márk Félegyházi, Christian Kreibich, Vern Paxson On the Potential of Proactive Domain Blacklisting. Search on Bibsonomy LEET The full citation details ... 2010 DBLP  BibTeX  RDF
1Moheeb Abu Rajab, Lucas Ballard, Panayiotis Mavrommatis, Niels Provos, Xin Zhao The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution. Search on Bibsonomy LEET The full citation details ... 2010 DBLP  BibTeX  RDF
1Willa K. Ehrlich, Anestis Karasaridis, David A. Hoeflin, Danielle Liu Detection of Spam Hosts and Spam Bots Using Network Flow Traffic Modeling. Search on Bibsonomy LEET The full citation details ... 2010 DBLP  BibTeX  RDF
1Stevens Le Blond, Arnaud Legout, Fabrice Le Fessant, Walid Dabbous, Mohamed Ali Kâafar Spying the World from Your Laptop: Identifying and Profiling Content Providers and Big Downloaders in BitTorrent. Search on Bibsonomy LEET The full citation details ... 2010 DBLP  BibTeX  RDF
1Chris Nunnery, Greg Sinclair, Brent ByungHoon Kang Tumbling Down the Rabbit Hole: Exploring the Idiosyncrasies of Botmaster Systems in a Multi-Tier Botnet Infrastructure. Search on Bibsonomy LEET The full citation details ... 2010 DBLP  BibTeX  RDF
1Jack W. Stokes, Reid Andersen, Christian Seifert, Kumar Chellapilla WebCop: Locating Neighborhoods of Malware on the Web. Search on Bibsonomy LEET The full citation details ... 2010 DBLP  BibTeX  RDF
1Kazumichi Sato, Keisuke Ishibashi, Tsuyoshi Toyono, Nobuhisa Miyake Extending Black Domain Name List by Using Co-occurrence Relation between DNS Queries. Search on Bibsonomy LEET The full citation details ... 2010 DBLP  BibTeX  RDF
1Chia Yuan Cho, Juan Caballero, Chris Grier, Vern Paxson, Dawn Song Insights from the Inside: A View of Botnet Management from Infiltration. Search on Bibsonomy LEET The full citation details ... 2010 DBLP  BibTeX  RDF
1Fabian Monrose, Srinivas Krishnan DNS Prefetching and Its Privacy Implications: When Good Things Go Bad. Search on Bibsonomy LEET The full citation details ... 2010 DBLP  BibTeX  RDF
1Tobias Lauinger, Veikko Pankakoski, Davide Balzarotti, Engin Kirda Honeybot, Your Man in the Middle for Automated Social Engineering. Search on Bibsonomy LEET The full citation details ... 2010 DBLP  BibTeX  RDF
1Michael D. Bailey (eds.) 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '10, San Jose, CA, USA, April 27, 2010 Search on Bibsonomy LEET The full citation details ... 2010 DBLP  BibTeX  RDF
1Jose Nazario PhoneyC: A Virtual Client Honeypot. Search on Bibsonomy LEET The full citation details ... 2009 DBLP  BibTeX  RDF
1Steven Cheung, Alfonso Valdes Malware Characterization through Alert Pattern Discovery. Search on Bibsonomy LEET The full citation details ... 2009 DBLP  BibTeX  RDF
1Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage Spamcraft: An Inside Look At Spam Campaign Orchestration. Search on Bibsonomy LEET The full citation details ... 2009 DBLP  BibTeX  RDF
1Michalis Polychronakis, Kostas G. Anagnostakis An Empirical Study of Real-world Polymorphic Code Injection Attacks. Search on Bibsonomy LEET The full citation details ... 2009 DBLP  BibTeX  RDF
1Tyler Moore 0001, Richard Clayton 0001 Temporal Correlations between Spam and Phishing Websites. Search on Bibsonomy LEET The full citation details ... 2009 DBLP  BibTeX  RDF
1Wenke Lee (eds.) 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '09, Boston, MA, USA, April 21, 2009 Search on Bibsonomy LEET The full citation details ... 2009 DBLP  BibTeX  RDF
1Márk Jelasity, Vilmos Bilicki Towards Automated Detection of Peer-to-Peer Botnets: On the Limits of Local Approaches. Search on Bibsonomy LEET The full citation details ... 2009 DBLP  BibTeX  RDF
1Phillip A. Porras, Hassen Saïdi A Foray into Conficker's Logic and Rendezvous Points. Search on Bibsonomy LEET The full citation details ... 2009 DBLP  BibTeX  RDF
1Georg Wicherski peHash: A Novel Approach to Fast Malware Clustering. Search on Bibsonomy LEET The full citation details ... 2009 DBLP  BibTeX  RDF
1Ulrich Bayer, Imam Habibi, Davide Balzarotti, Engin Kirda A View on Current Malware Behaviors. Search on Bibsonomy LEET The full citation details ... 2009 DBLP  BibTeX  RDF
1Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage On the Spam Campaign Trail. Search on Bibsonomy LEET The full citation details ... 2008 DBLP  BibTeX  RDF
1D. Kevin McGrath, Minaxi Gupta Behind Phishing: An Examination of Phisher Modi Operandi. Search on Bibsonomy LEET The full citation details ... 2008 DBLP  BibTeX  RDF
1Abhinav Pathak, Y. Charlie Hu, Zhuoqing Morley Mao Peeking into Spammer Behavior from a Unique Vantage Point. Search on Bibsonomy LEET The full citation details ... 2008 DBLP  BibTeX  RDF
1Aaron J. Burstein Conducting Cybersecurity Research Legally and Ethically. Search on Bibsonomy LEET The full citation details ... 2008 DBLP  BibTeX  RDF
1Guanhua Yan, Zhen Xiao, Stephan J. Eidenbenz Catching Instant Messaging Worms with Change-Point Detection Techniques. Search on Bibsonomy LEET The full citation details ... 2008 DBLP  BibTeX  RDF
1Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst W. Biersack, Felix C. Freiling Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm. Search on Bibsonomy LEET The full citation details ... 2008 DBLP  BibTeX  RDF
1Blaine Nelson, Marco Barreno, Fuching Jack Chi, Anthony D. Joseph, Benjamin I. P. Rubinstein, Udam Saini, Charles Sutton, J. Doug Tygar, Kai Xia Exploiting Machine Learning to Subvert Your Spam Filter. Search on Bibsonomy LEET The full citation details ... 2008 DBLP  BibTeX  RDF
1Samuel T. King, Joseph A. Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, Yuanyuan Zhou 0001 Designing and Implementing Malicious Hardware. Search on Bibsonomy LEET The full citation details ... 2008 DBLP  BibTeX  RDF
1Michalis Polychronakis, Niels Provos Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware. Search on Bibsonomy LEET The full citation details ... 2008 DBLP  BibTeX  RDF
1Li Zhuang, John Dunagan, Daniel R. Simon, Helen J. Wang, Ivan Osipkov, J. Doug Tygar Characterizing Botnets from Email Spam Records. Search on Bibsonomy LEET The full citation details ... 2008 DBLP  BibTeX  RDF
1Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Stefan Savage The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff. Search on Bibsonomy LEET The full citation details ... 2008 DBLP  BibTeX  RDF
1Fabian Monrose (eds.) First USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '08, San Francisco, CA, USA, April 15, 2008, Proceedings Search on Bibsonomy LEET The full citation details ... 2008 DBLP  BibTeX  RDF
Displaying result #1 - #69 of 69 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license