Author of the publication

MisleadingWorm Signature Generators Using Deliberate Noise Injection.

, , , , and . IEEE Symposium on Security and Privacy, page 17-31. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Environment-Sensitive Intrusion Detection., , , , and . RAID, volume 3858 of Lecture Notes in Computer Science, page 185-206. Springer, (2005)Understanding the Privacy Implications of ECS - (Extended Abstract)., , , , and . DIMVA, volume 9721 of Lecture Notes in Computer Science, page 343-353. Springer, (2016)Beheading hydras: performing effective botnet takedowns., , , , and . ACM Conference on Computer and Communications Security, page 121-132. ACM, (2013)Recursive DNS Architectures and Vulnerability Implications., , , , , and . NDSS, The Internet Society, (2009)SinkMiner: Mining Botnet Sinkholes for Fun and Profit., , , and . LEET, USENIX Association, (2013)Protecting Secret Data from Insider Attacks., , and . Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, page 16-30. Springer, (2005)Domain-Z: 28 Registrations Later Measuring the Exploitation of Residual Trust in Domains., , , , , and . IEEE Symposium on Security and Privacy, page 691-706. IEEE Computer Society, (2016)Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries., , , , and . ACM Conference on Computer and Communications Security, page 211-222. ACM, (2008)Measuring lower bounds of the financial abuse to online advertisers: A four year case study of the TDSS/TDL4 Botnet., , , , , and . Comput. Secur., (2017)Large-scale DNS data analysis.. CCS, page 1054-1055. ACM, (2012)