Author of the publication

From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware.

, , , , , , and . USENIX Security Symposium, page 491-506. USENIX Association, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Just awful enough: the functional dysfunction of the something awful forums., , , and . CHI, page 2407-2410. ACM, (2014)Connected Colors: Unveiling the Structure of Criminal Networks., , , and . RAID, volume 8145 of Lecture Notes in Computer Science, page 390-410. Springer, (2013)Dawn of the Dead Domain: Measuring the Exploitation of Residual Trust in Domains., , , , , and . IEEE Secur. Priv., 15 (2): 70-77 (2017)Domain-Z: 28 Registrations Later Measuring the Exploitation of Residual Trust in Domains., , , , , and . IEEE Symposium on Security and Privacy, page 691-706. IEEE Computer Society, (2016)Measuring lower bounds of the financial abuse to online advertisers: A four year case study of the TDSS/TDL4 Botnet., , , , , and . Comput. Secur., (2017)Still Beheading Hydras: Botnet Takedowns Then and Now., , and . IEEE Trans. Dependable Secur. Comput., 14 (5): 535-549 (2017)Understanding the Privacy Implications of ECS - (Extended Abstract)., , , , and . DIMVA, volume 9721 of Lecture Notes in Computer Science, page 343-353. Springer, (2016)Understanding the prevalence and use of alternative plans in malware with network games., , , and . ACSAC, page 1-10. ACM, (2011)Automated remote repair for mobile malware., , and . ACSAC, page 413-422. ACM, (2011)Beheading hydras: performing effective botnet takedowns., , , , and . ACM Conference on Computer and Communications Security, page 121-132. ACM, (2013)