![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
LEET 2009: Boston, MA, USA
- Wenke Lee:
2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '09, Boston, MA, USA, April 21, 2009. USENIX Association 2009 - Phillip A. Porras, Hassen Saïdi:
A Foray into Conficker's Logic and Rendezvous Points. - Ulrich Bayer, Imam Habibi, Davide Balzarotti, Engin Kirda:
A View on Current Malware Behaviors. - Michalis Polychronakis, Kostas G. Anagnostakis:
An Empirical Study of Real-world Polymorphic Code Injection Attacks. - Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
Spamcraft: An Inside Look At Spam Campaign Orchestration. - Tyler Moore, Richard Clayton:
Temporal Correlations between Spam and Phishing Websites. - Jose Nazario:
PhoneyC: A Virtual Client Honeypot. - Georg Wicherski:
peHash: A Novel Approach to Fast Malware Clustering. - Steven Cheung, Alfonso Valdes:
Malware Characterization through Alert Pattern Discovery. - Márk Jelasity, Vilmos Bilicki:
Towards Automated Detection of Peer-to-Peer Botnets: On the Limits of Local Approaches.
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.