Abstract is missing.
- A Rose by Any Other Name or an Insane Root? Adventures in Name ResolutionHayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger. 1-8 [doi]
- On Botnets That Use DNS for Command and ControlChristian J. Dietrich, Christian Rossow, Felix C. Freiling, Herbert Bos, Maarten van Steen, Norbert Pohlmann. 9-16 [doi]
- dead.drop: URL-Based Stealthy MessagingGeorgios Kontaxis, Iasonas Polakis, Michalis Polychronakis, Evangelos P. Markatos. 17-24 [doi]
- Adaptive Detection of Covert Communication in HTTP RequestsGuido Schwenk, Konrad Rieck. 25-32 [doi]
- IRILD: An Information Retrieval Based Method for Information Leak DetectionEleni Gessiou, Quang Hieu Vu, Sotiris Ioannidis. 33-40 [doi]
- MELISSA: Towards Automated Detection of Undesirable User Actions in Critical InfrastructuresDina Hadziosmanovic, Damiano Bolzoni, Pieter H. Hartel, Sandro Etalle. 41-48 [doi]
- Remote Control of Smart Meters: Friend or Foe?Mihai Costache, Valentin Tudor, Magnus Almgren, Marina Papatriantafilou, Christopher Saunders. 49-56 [doi]
- The Anti-Social Behavior of SpamFarnaz Moradi, Tomas Olovsson, Philippas Tsigas. 57 [doi]
- Location Privacy: User-Centric Threat AnalysisBenjamin Greschbach. 58 [doi]
- Mitigating Distributed Denial-of-Service Attacks: Application-Defense and Network-Defense MethodsZhang Fu. 59 [doi]
- CAPTCHuring Automated (Smart)Phone AttacksIasonas Polakis, Georgios Kontaxis, Sotiris Ioannidis. 60 [doi]
- Security in Wireless Sensor NetworksAndreas Larsson, Philippas Tsigas. 61 [doi]
- Discussion Panel in conjunction with the 7th European Conference on Computer Network Defense (EC2ND 2011): Security Issues in the Smart GridMagnus Almgren, Marina Papatriantafilou. 62-63 [doi]