Search dblp for Publications

export results for "toc:db/conf/nsdi/leet2008.bht:"

 download as .bib file

@inproceedings{DBLP:conf/nsdi/Burstein08,
  author       = {Aaron J. Burstein},
  editor       = {Fabian Monrose},
  title        = {Conducting Cybersecurity Research Legally and Ethically},
  booktitle    = {First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '08, San Francisco, CA, USA, April 15, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/leet08/tech/full\_papers/burstein/burstein.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nsdi/Burstein08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/HolzSDBF08,
  author       = {Thorsten Holz and
                  Moritz Steiner and
                  Frederic Dahl and
                  Ernst W. Biersack and
                  Felix C. Freiling},
  editor       = {Fabian Monrose},
  title        = {Measurements and Mitigation of Peer-to-Peer-based Botnets: {A} Case
                  Study on Storm Worm},
  booktitle    = {First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '08, San Francisco, CA, USA, April 15, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/leet08/tech/full\_papers/holz/holz.pdf},
  timestamp    = {Mon, 26 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nsdi/HolzSDBF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/KanichLEVS08,
  author       = {Chris Kanich and
                  Kirill Levchenko and
                  Brandon Enright and
                  Geoffrey M. Voelker and
                  Stefan Savage},
  editor       = {Fabian Monrose},
  title        = {The Heisenbot Uncertainty Problem: Challenges in Separating Bots from
                  Chaff},
  booktitle    = {First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '08, San Francisco, CA, USA, April 15, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/leet08/tech/full\_papers/kanich/kanich.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nsdi/KanichLEVS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/KingTCGJZ08,
  author       = {Samuel T. King and
                  Joseph A. Tucek and
                  Anthony Cozzie and
                  Chris Grier and
                  Weihang Jiang and
                  Yuanyuan Zhou},
  editor       = {Fabian Monrose},
  title        = {Designing and Implementing Malicious Hardware},
  booktitle    = {First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '08, San Francisco, CA, USA, April 15, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/leet08/tech/full\_papers/king/king.pdf},
  timestamp    = {Thu, 12 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nsdi/KingTCGJZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/KreibichKLEVPS08,
  author       = {Christian Kreibich and
                  Chris Kanich and
                  Kirill Levchenko and
                  Brandon Enright and
                  Geoffrey M. Voelker and
                  Vern Paxson and
                  Stefan Savage},
  editor       = {Fabian Monrose},
  title        = {On the Spam Campaign Trail},
  booktitle    = {First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '08, San Francisco, CA, USA, April 15, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/leet08/tech/full\_papers/kreibich/kreibich.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nsdi/KreibichKLEVPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/McGrathG08,
  author       = {D. Kevin McGrath and
                  Minaxi Gupta},
  editor       = {Fabian Monrose},
  title        = {Behind Phishing: An Examination of Phisher Modi Operandi},
  booktitle    = {First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '08, San Francisco, CA, USA, April 15, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/leet08/tech/full\_papers/mcgrath/mcgrath.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nsdi/McGrathG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/NelsonBCJRSSTX08,
  author       = {Blaine Nelson and
                  Marco Barreno and
                  Fuching Jack Chi and
                  Anthony D. Joseph and
                  Benjamin I. P. Rubinstein and
                  Udam Saini and
                  Charles Sutton and
                  J. Doug Tygar and
                  Kai Xia},
  editor       = {Fabian Monrose},
  title        = {Exploiting Machine Learning to Subvert Your Spam Filter},
  booktitle    = {First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '08, San Francisco, CA, USA, April 15, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/leet08/tech/full\_papers/nelson/nelson.pdf},
  timestamp    = {Mon, 12 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nsdi/NelsonBCJRSSTX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/PathakHM08,
  author       = {Abhinav Pathak and
                  Y. Charlie Hu and
                  Zhuoqing Morley Mao},
  editor       = {Fabian Monrose},
  title        = {Peeking into Spammer Behavior from a Unique Vantage Point},
  booktitle    = {First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '08, San Francisco, CA, USA, April 15, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/leet08/tech/full\_papers/pathak/pathak.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nsdi/PathakHM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/PolychronakisP08,
  author       = {Michalis Polychronakis and
                  Niels Provos},
  editor       = {Fabian Monrose},
  title        = {Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware},
  booktitle    = {First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '08, San Francisco, CA, USA, April 15, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/leet08/tech/full\_papers/polychronakis/polychronakis.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nsdi/PolychronakisP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/YanXE08,
  author       = {Guanhua Yan and
                  Zhen Xiao and
                  Stephan J. Eidenbenz},
  editor       = {Fabian Monrose},
  title        = {Catching Instant Messaging Worms with Change-Point Detection Techniques},
  booktitle    = {First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '08, San Francisco, CA, USA, April 15, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/leet08/tech/full\_papers/yan/yan.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nsdi/YanXE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/ZhuangDSWOT08,
  author       = {Li Zhuang and
                  John Dunagan and
                  Daniel R. Simon and
                  Helen J. Wang and
                  Ivan Osipkov and
                  J. Doug Tygar},
  editor       = {Fabian Monrose},
  title        = {Characterizing Botnets from Email Spam Records},
  booktitle    = {First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '08, San Francisco, CA, USA, April 15, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/leet08/tech/full\_papers/zhuang/zhuang.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nsdi/ZhuangDSWOT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nsdi/2008leet,
  editor       = {Fabian Monrose},
  title        = {First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '08, San Francisco, CA, USA, April 15, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nsdi/2008leet.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics