×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [christopher kruegel]
The Harvester, the Botmaster, and the Spammer: On the Relations Between the Different Actors in the Spam Landscape
341 views
Fear the EAR: Discovering and Mitigating Execution After Redirect Vulnerabilities
580 views
MR201405 A Survey of Environment Sensitive Malware
210 views
Follow the Green: Growth and Dynamics on Twitter Follower Markets
383 views
Malware Analysis on a Shoestring Budget
1.798 views
Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evasive Malware — Christopher Kruegel at Black Hat 2014
405 views
Malware clustering and classification Peng Li
[email protected]
240 views
Sean Ford, Macro Cova, Christopher Kruegel, Giovanni Vigna University of California, Santa Barbara ACSAC 2009
216 views
Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer,
227 views
Leveraging User Interactions for In-Depth Testing of Web Applications Sean McAllister, Engin Kirda, and Christopher Kruegel RAID ’08 1 Seoyeon Kang November
217 views
Crowdsourcing: Opportunity or New Threat? Major Area Exam: June 12 th Gang Wang Committee: Prof. Ben Y. Zhao (Co-chair) Prof. Heather Zheng (Co-chair)
216 views
An Anomaly-Based Approach for Intrusion Detection in Web Traffic Carmen Torrano-Gimenez, Alejandro Perez-Villegas and Gonzalo Alvarez Instituto de Física
213 views
Next >