|
Conferences in DBLP
Conducting Cybersecurity Research Legally and Ethically. [Citation Graph (, )][DBLP]
Peeking into Spammer Behavior from a Unique Vantage Point. [Citation Graph (, )][DBLP]
On the Spam Campaign Trail. [Citation Graph (, )][DBLP]
The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff. [Citation Graph (, )][DBLP]
Characterizing Botnets from Email Spam Records. [Citation Graph (, )][DBLP]
Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware. [Citation Graph (, )][DBLP]
Exploiting Machine Learning to Subvert Your Spam Filter. [Citation Graph (, )][DBLP]
Behind Phishing: An Examination of Phisher Modi Operandi. [Citation Graph (, )][DBLP]
Designing and Implementing Malicious Hardware. [Citation Graph (, )][DBLP]
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm. [Citation Graph (, )][DBLP]
Catching Instant Messaging Worms with Change-Point Detection Techniques. [Citation Graph (, )][DBLP]
|