Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 57 matches
- 2013
- Luca Allodi:
Attacker Economics for Internet-scale Vulnerability Risk Assessment. LEET 2013 - Jason W. Clark, Damon McCoy:
There Are No Free iPads: An Analysis of Survey Scams as a Business. LEET 2013 - Mohammad Karami, Damon McCoy:
Understanding the Emerging Threat of DDoS-as-a-Service. LEET 2013 - Charles LeDoux, Arun Lakhotia, Craig Miles, Vivek Notani, Avi Pfeffer:
FuncTracker: Discovering Shared Code to Aid Malware Forensics. LEET 2013 - Matthias Neugschwandtner, Martina Lindorfer, Christian Platzer:
A View to a Kill: WebView Exploitation. LEET 2013 - Babak Rahbarinia, Roberto Perdisci, Manos Antonakakis, David Dagon:
SinkMiner: Mining Botnet Sinkholes for Fun and Profit. LEET 2013 - Chuan Yue:
The Devil Is Phishing: Rethinking Web Single Sign-On Systems Security. LEET 2013 - Chengcui Zhang, Rupak Kharel, Song Gao, Jason Britt:
Image Matching for Branding Phishing Kit Images. LEET 2013 - Vern Paxson:
6th USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '13, Washington, D.C., USA, August 12, 2013. USENIX Association 2013 [contents] - 2012
- Alexandru G. Bardas, Loai Zomlot, Sathya Chandran Sundaramurthy, Xinming Ou, S. Raj Rajagopalan, Marc R. Eisenbarth:
Classification of UDP Traffic for DDoS Detection. LEET 2012 - Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu:
Key Challenges in Defending Against Malicious Socialbots. LEET 2012 - Jason Britt, Brad Wardman, Alan P. Sprague, Gary Warner:
Clustering Potential Phishing Websites Using DeepMD5. LEET 2012 - Armin Büscher, Thorsten Holz:
Tracking DDoS Attacks: Insights into the Business of Disrupting the Web. LEET 2012 - Eric Chien, Liam O'Murchu, Nicolas Falliere:
W32.Duqu: The Precursor to the Next Stuxnet. LEET 2012 - David Dittrich:
So You Want to Take Over a Botnet... LEET 2012 - Tudor Dumitras, Petros Efstathopoulos:
Ask WINE: Are We Safer Today? Evaluating Operating System Security through Big Data Analysis. LEET 2012 - Paul Ferguson:
Observations on Emerging Threats. LEET 2012 - Ari Juels, Ting-Fang Yen:
Sherlock Holmes and the Case of the Advanced Persistent Threat. LEET 2012 - Yeongung Park, Choonghyun Lee, Chanhee Lee, JiHyeog Lim, Sangchul Han, Minkyu Park, Seong-je Cho:
RGBDroid: A Novel Response-Based Approach to Android Privilege Escalation Attacks. LEET 2012 - Mike Samuel, Úlfar Erlingsson:
Let's Parse to Prevent Pwnage. LEET 2012 - Kurt Thomas, Chris Grier, Vern Paxson:
Adapting Social Spam Infrastructure for Political Censorship. LEET 2012 - Alok Tongaonkar, Ram Keralapura, Antonio Nucci:
Challenges in Network Application Identification. LEET 2012 - Engin Kirda:
5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '12, San Jose, CA, USA, April 24, 2012. USENIX Association 2012 [contents] - 2011
- Mohammed I. Al-Saleh, Jedidiah R. Crandall:
Application-Level Reconnaissance: Timing Channel Attacks Against Antivirus Software. LEET 2011 - Xiang Cui, Binxing Fang, Lihua Yin, Xiaoyi Liu, Tianning Zang:
Andbot: Towards Advanced Mobile Botnets. LEET 2011 - Jeff Green, Joshua Juen, Omid Fatemieh, Ravinder Shankesi, Dong (Kevin) Jin, Carl A. Gunter:
Reconstructing Hash Reversal based Proof of Work Schemes. LEET 2011 - Nathaniel Husted, Steven A. Myers:
Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm. LEET 2011 - Stevens Le Blond, Pere Manils, Chaabane Abdelberi, Mohamed Ali Kâafar, Claude Castelluccia, Arnaud Legout, Walid Dabbous:
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users. LEET 2011 - He Liu, Kirill Levchenko, Márk Félegyházi, Christian Kreibich, Gregor Maier, Geoffrey M. Voelker:
On the Effects of Registrar-level Intervention. LEET 2011 - Nick Nikiforakis, Marco Balduzzi, Steven Van Acker, Wouter Joosen, Davide Balzarotti:
Exposing the Lack of Privacy in File Hosting Services. LEET 2011
skipping 27 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-25 00:46 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint