Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Elizabeth Stinson
@inproceedings{DBLP:conf/uss/BriesemeisterDLSTDKSOM10, author = {Linda Briesemeister and Steven Dawson and Patrick Lincoln and Hassen Sa{\"{\i}}di and Jim Thornton and Glenn Durfee and Peter C. S. Kwan and Elizabeth Stinson and Adam J. Oliner and John C. Mitchell}, editor = {Nadav Aharony and Yaniv Altshuler and Yuval Elovici}, title = {Homogeneity as an Advantage: It Takes a Community to Protect an Application}, booktitle = {2010 Workshop on Collaborative Methods for Security and Privacy, CollSec'10, Washington, D.C., USA, August 10, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/collsec10/homogeneity-advantage-it-takes-community-protect-application}, timestamp = {Mon, 01 Feb 2021 08:42:51 +0100}, biburl = {https://dblp.org/rec/conf/uss/BriesemeisterDLSTDKSOM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MartignoniSFJM08, author = {Lorenzo Martignoni and Elizabeth Stinson and Matt Fredrikson and Somesh Jha and John C. Mitchell}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {A Layered Architecture for Detecting Malicious Behaviors}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {78--97}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_5}, doi = {10.1007/978-3-540-87403-4\_5}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/MartignoniSFJM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/StinsonM08, author = {Elizabeth Stinson and John C. Mitchell}, editor = {Dan Boneh and Tal Garfinkel and Dug Song}, title = {Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods}, booktitle = {2nd {USENIX} Workshop on Offensive Technologies, WOOT'08, San Jose, CA, USA, July 28, 2008, Proceedings}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/woot08/tech/full\_papers/stinson/stinson.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/StinsonM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/StinsonM08, author = {Elizabeth Stinson and John C. Mitchell}, editor = {Wenke Lee and Cliff Wang and David Dagon}, title = {Characterizing Bots' Remote Control Behavior}, booktitle = {Botnet Detection: Countering the Largest Security Threat}, series = {Advances in Information Security}, volume = {36}, pages = {45--64}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-68768-1\_3}, doi = {10.1007/978-0-387-68768-1\_3}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/StinsonM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/StinsonM07, author = {Elizabeth Stinson and John C. Mitchell}, editor = {Bernhard M. H{\"{a}}mmerli and Robin Sommer}, title = {Characterizing Bots' Remote Control Behavior}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, 4th International Conference, {DIMVA} 2007, Lucerne, Switzerland, July 12-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4579}, pages = {89--108}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73614-1\_6}, doi = {10.1007/978-3-540-73614-1\_6}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/StinsonM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.