Abstract is missing.
- The Heisenbot Uncertainty Problem: Challenges in Separating Bots from ChaffChris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Stefan Savage. [doi]
- Ghost Turns Zombie: Exploring the Life Cycle of Web-based MalwareMichalis Polychronakis, Niels Provos. [doi]
- Conducting Cybersecurity Research Legally and EthicallyAaron J. Burstein. [doi]
- Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm WormThorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, Felix C. Freiling. [doi]
- Behind Phishing: An Examination of Phisher Modi OperandiD. Kevin McGrath, Minaxi Gupta. [doi]
- Characterizing Botnets from Email Spam RecordsLi Zhuang, John Dunagan, Daniel R. Simon, Helen J. Wang, Ivan Osipkov, J. Doug Tygar. [doi]
- On the Spam Campaign TrailChristian Kreibich, Chris Kanich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage. [doi]
- Catching Instant Messaging Worms with Change-Point Detection TechniquesGuanhua Yan, Zhen Xiao, Stephan Eidenbenz. [doi]
- Peeking into Spammer Behavior from a Unique Vantage PointAbhinav Pathak, Y. Charlie Hu, Zhuoqing Morley Mao. [doi]
- Exploiting Machine Learning to Subvert Your Spam FilterBlaine Nelson, Marco Barreno, Fuching Jack Chi, Anthony D. Joseph, Benjamin I. P. Rubinstein, Udam Saini, Charles Sutton, J. Doug Tygar, Kai Xia. [doi]
- Designing and Implementing Malicious HardwareSamuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, Yuanyuan Zhou. [doi]