Biblio

Export 22 results:
Filters: Author is Damon McCoy  [Clear All Filters]
2017
Siadati H, Palka S, Siegel A, McCoy D.  2017.  Measuring the Effectiveness of Embedded Phishing Exercises. 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17).
2015
Palka S, McCoy D.  2015.  Fuzzing E-mail Filters with Generative Grammars and N-Gram Analysis. 9th USENIX Workshop on Offensive Technologies (WOOT 15).
2013
Everett CE, McCoy D.  2013.  OCTANE (Open Car Testbed and Network Experiments): Bringing Cyber-Physical Security Research to Researchers and Students. 6th Workshop on Cyber Security Experimentation and Test (CSET 13).
Clark JW, McCoy D.  2013.  There Are No Free iPads: An Analysis of Survey Scams as a Business. 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 13).
Thomas K, McCoy D, Grier C, Kolcz A, Paxson V.  2013.  Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. 22nd USENIX Security Symposium (USENIX Security 13). :195--210.
Karami M, McCoy D.  2013.  Understanding the Emerging Threat of DDoS-as-a-Service. 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 13).
2006
Franklin J, McCoy D.  2006.  Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting. 15th USENIX Security Symposium (USENIX Security 06).