USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Papers
Search results
Conference | Title | Author(s) |
---|---|---|
LEET '09 | A View on Current Malware Behaviors | Ulrich Bayer, Imam Habibi, Davide Balzarotti, Engin Kirda |
LEET '09 | An Empirical Study of Real-world Polymorphic Code Injection Attacks | Michalis Polychronakis, Kostas G. Anagnostakis |
LEET '08 | On the Spam Campaign Trail | Christian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage |
LEET '08 | Characterizing Botnets from Email Spam Records | Li Zhuang, John Dunagan, Daniel R. Simon, Helen J. Wang, Ivan Osipkov, Geoff Hulten, J.D. Tygar |
LEET '08 | Peeking into Spammer Behavior from a Unique Vantage Point | Abhinav Pathak, Y. Charlie Hu, Z. Morley Mao |
LEET '08 | Behind Phishing: An Examination of Phisher Modi Operandi | D. Kevin McGrath, Minaxi Gupta |
LEET '08 | Designing and Implementing Malicious Hardware | Samuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, Yuanyuan Zhou |
LEET '08 | Catching Instant Messaging Worms with Change-Point Detection Techniques | Guanhua Yan, Zhen Xiao, Stephan Eidenbenz |
LEET '08 | Exploiting Machine Learning to Subvert Your Spam Filter | Blaine Nelson, Marco Barreno, Fuching Jack Chi, Anthony D. Joseph, Benjamin I.P. Rubinstein, Udam Saini, Charles Sutton, Kai Xia |
LEET '08 | Conducting Cybersecurity Research Legally and Ethically | Aaron J. Burstein |
LEET '08 | Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm | Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, Felix Freiling |
LEET '08 | The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff | Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Stefan Savage |
LEET '08 | Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware | Michalis Polychronakis, Panayiotis Mavrommatis |
Pages
- « first
- ‹ previous
- 1
- 2
- 3