Abstract is missing.
- Extensible Web Browser SecurityMike Ter Louw, Jin Soon Lim, V. N. Venkatakrishnan. 1-19 [doi]
- On the Effectiveness of Techniques to Detect Phishing SitesChristian Ludl, Sean McAllister, Engin Kirda, Christopher Kruegel. 20-39 [doi]
- Protecting the Intranet Against JavaScript Malware and Related AttacksMartin Johns, Justus Winter. 40-59 [doi]
- On the Effects of Learning Set Corruption in Anomaly-Based Detection of Web DefacementsEric Medvet, Alberto Bartoli. 60-78 [doi]
- Intrusion Detection as Passive Testing: Linguistic Support with TTCN-3 (Extended Abstract)Krzysztof M. Brzezinski. 79-88 [doi]
- Characterizing Bots Remote Control BehaviorElizabeth Stinson, John C. Mitchell. 89-108 [doi]
- Measurement and Analysis of Autonomous Spreading Malware in a University EnvironmentJan Goebel, Thorsten Holz, Carsten Willems. 109-128 [doi]
- Passive Monitoring of DNS AnomaliesBojan Zdrnja, Nevil Brownlee, Duane Wessels. 129-139 [doi]
- Characterizing Dark DNS BehaviorJon Oberheide, Manish Karir, Zhuoqing Morley Mao. 140-156 [doi]
- Distributed Evasive Scan Techniques and CountermeasuresMin Gyung Kang, Juan Caballero, Dawn Xiaodong Song. 157-174 [doi]
- On the Adaptive Real-Time Detection of Fast-Propagating Network WormsJaeyeon Jung, Rodolfo A. Milito, Vern Paxson. 175-192 [doi]
- Targeting Physically Addressable MemoryDavid R. Piegdon, Lexi Pimenidis. 193-212 [doi]
- Static Analysis on x86 Executables for Preventing Automatic Mimicry AttacksDanilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi. 213-230 [doi]
- A Study of Malcode-Bearing DocumentsWei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, Elli Androulaki, Angelos D. Keromytis. 231-250 [doi]