Abstract is missing.
- Malware Characterization through Alert Pattern DiscoverySteven Cheung, Alfonso Valdes. [doi]
- A Foray into Conficker's Logic and Rendezvous PointsPhillip A. Porras, Hassen Saïdi. [doi]
- An Empirical Study of Real-world Polymorphic Code Injection AttacksMichalis Polychronakis, Kostas G. Anagnostakis. [doi]
- Towards Automated Detection of Peer-to-Peer Botnets: On the Limits of Local ApproachesMárk Jelasity, Vilmos Bilicki. [doi]
- peHash: A Novel Approach to Fast Malware ClusteringGeorg Wicherski. [doi]
- PhoneyC: A Virtual Client HoneypotJose Nazario. [doi]
- Spamcraft: An Inside Look At Spam Campaign OrchestrationChristian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage. [doi]
- Temporal Correlations between Spam and Phishing WebsitesTyler Moore, Richard Clayton. [doi]
- A View on Current Malware BehaviorsUlrich Bayer, Imam Habibi, Davide Balzarotti, Engin Kirda. [doi]