Abstract is missing.
- Clustering Potential Phishing Websites Using DeepMD5Jason Britt, Brad Wardman, Alan Sprague, Gary Warner. [doi]
- So You Want to Take Over a Botnet..David Dittrich. [doi]
- Sherlock Holmes and the Case of the Advanced Persistent ThreatAri Juels, Ting-Fang Yen. [doi]
- Challenges in Network Application IdentificationAlok Tongaonkar, Ram Keralapura, Antonio Nucci. [doi]
- Ask WINE: Are We Safer Today? Evaluating Operating System Security through Big Data AnalysisTudor Dumitras, Petros Efstathopoulos. [doi]
- Tracking DDoS Attacks: Insights into the Business of Disrupting the WebArmin Büscher, Thorsten Holz. [doi]
- Let's Parse to Prevent PwnageMike Samuel, Úlfar Erlingsson. [doi]
- RGBDroid: A Novel Response-Based Approach to Android Privilege Escalation AttacksYeongung Park, Choonghyun Lee, Chanhee Lee, JiHyeog Lim, Sangchul Han, Minkyu Park, Seongje Cho. [doi]
- Key Challenges in Defending Against Malicious SocialbotsYazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu. [doi]
- W32.Duqu: The Precursor to the Next StuxnetEric Chien, Liam O'Murchu, Nicolas Falliere. [doi]
- Classification of UDP Traffic for DDoS DetectionAlexandru G. Bardas, Loai Zomlot, Sathya Chandran Sundaramurthy, Xinming Ou, S. Raj Rajagopalan, Marc R. Eisenbarth. [doi]
- Observations on Emerging ThreatsPaul Ferguson. [doi]
- Adapting Social Spam Infrastructure for Political CensorshipKurt Thomas, Chris Grier, Vern Paxson. [doi]