Abstract is missing.
- Morphological detection of malwareGuillaume Bonfante, Matthieu Kaczmarek, Jean-Yves Marion. 1-8 [doi]
- Server-side script polumorphism: Techniques of analysis and defenseCristian Craioveanu. 9-16 [doi]
- An automatic anti-anti-VMware technique applicable for multi-stage packed malwareLi Sun, Tim Ebringer, S. Boztag. 17-23 [doi]
- As the net churns: Fast-flux botnet observationsJose Nazario, Thorsten Holz. 24-31 [doi]
- Sybil attacks as a mitigation strategy against the Storm botnetCarlton R. Davis, José M. Fernandez, Stephen Neville, John McHugh. 32-40 [doi]
- P2P as botnet command and control: A deeper insightDavid Dittrich, Sven Dietrich. 41-48 [doi]
- Superimposing permutational covert channels onto reliable stream protocolsJamie Levy, Jaroslaw Paduch, Bilal Khan. 49-56 [doi]
- Shades of grey: On the effectiveness of reputation-based "blacklists"Sushant Sinha, Michael Bailey, Farnam Jahanian. 57-64 [doi]
- Image spam - ASCII to the rescue!Jordan Nielson, Daniel Medeiros Nunes de Castro, John Aycock. 65-68 [doi]
- Function length as a tool for malware classificationRonghua Tian, Lynn Margaret Batten, Steven Versteeg. 69-76 [doi]
- Using Markov chains to filter machine-morphed variants of malicious programsMohamed R. Chouchane, Andrew Walenstein, Arun Lakhotia. 77-84 [doi]
- Combating file infectors on corporate networksVinoo Thomas, Nitin Jyoti. 85-91 [doi]
- State of wireless security implementations in the United States and Europe - empirical dataFernando C. Colón Osorio. 92-97 [doi]
- Drive-by downloads from the trenchesDavid Harley, Pierre-Marc Bureau. 98-103 [doi]