USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 30 results:
Filters: Author is Thorsten Holz [Clear All Filters]
BOTMAGNIFIER: Locating Spambots on the Internet. 20th USENIX Security Symposium (USENIX Security 11).
.
2011. JACKSTRAWS: Picking Command and Control Connections from Bot Traffic. 20th USENIX Security Symposium (USENIX Security 11).
.
2011. The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns. 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11).
.
2011. Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm. First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 08).
.
2008. Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation. First Workshop on Hot Topics in Understanding Botnets (HotBots 07).
.
2007.