The SCEAS System
Navigation Menu

Conferences in DBLP

Networked Systems Design and Implementation (nsdi)
2008 (conf/nsdi/2008leet)

  1. Conducting Cybersecurity Research Legally and Ethically. [Citation Graph (, )][DBLP]

  2. Peeking into Spammer Behavior from a Unique Vantage Point. [Citation Graph (, )][DBLP]

  3. On the Spam Campaign Trail. [Citation Graph (, )][DBLP]

  4. The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff. [Citation Graph (, )][DBLP]

  5. Characterizing Botnets from Email Spam Records. [Citation Graph (, )][DBLP]

  6. Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware. [Citation Graph (, )][DBLP]

  7. Exploiting Machine Learning to Subvert Your Spam Filter. [Citation Graph (, )][DBLP]

  8. Behind Phishing: An Examination of Phisher Modi Operandi. [Citation Graph (, )][DBLP]

  9. Designing and Implementing Malicious Hardware. [Citation Graph (, )][DBLP]

  10. Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm. [Citation Graph (, )][DBLP]

  11. Catching Instant Messaging Worms with Change-Point Detection Techniques. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002