Biblio

Export 20 results:
Filters: Author is Damon McCoy  [Clear All Filters]
2017
Siadati H, Palka S, Siegel A, McCoy D.  2017.  Measuring the Effectiveness of Embedded Phishing Exercises. 10th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 17).
2015
Palka S, McCoy D.  2015.  Fuzzing E-mail Filters with Generative Grammars and N-Gram Analysis. 9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15).
2013
Everett CE, McCoy D.  2013.  OCTANE (Open Car Testbed and Network Experiments): Bringing Cyber-Physical Security Research to Researchers and Students. 6th Workshop on Cyber Security Experimentation and Test ({CSET} 13).
Clark JW, McCoy D.  2013.  There Are No Free iPads: An Analysis of Survey Scams as a Business. 6th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 13).
Thomas K, McCoy D, Grier C, Kolcz A, Paxson V.  2013.  Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. 22nd {USENIX} Security Symposium ({USENIX} Security 13). :195--210.
Karami M, McCoy D.  2013.  Understanding the Emerging Threat of DDoS-as-a-Service. 6th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 13).
2006
Franklin J, McCoy D.  2006.  Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting. 15th {USENIX} Security Symposium ({USENIX} Security 06).