Abstract is missing.
- The Rising Tide: DDoS from Defective Designs and DefaultsRichard Clayton. [doi]
- Tracking the Role of Adversaries in Measuring Unwanted TrafficMark Allman, Paul Barford, Balachander Krishnamurthy, Jia Wang. [doi]
- An Algorithm for Anomaly-based Botnet DetectionJames R. Binkley, Suresh Singh. [doi]
- Efficient and Secure Source Authentication with Packet PassportsXin Liu, Xiaowei Yang, David Wetherall, Thomas E. Anderson. [doi]
- Cookies Along Trust-Boundaries (CAT): Accurate and Deployable Flood ProtectionMartin Casado, Aditya Akella, Pei Cao, Niels Provos, Scott Shenker. [doi]
- Revealing Botnet Membership Using DNSBL Counter-IntelligenceAnirudh Ramachandran, Nick Feamster, David Dagon. [doi]
- Separating Wheat from the Chaff: A Deployable Approach to Counter SpamYoungsang Shin, Minaxi Gupta, Rob Henderson, Aaron Emigh. [doi]
- Leveraging Good Intentions to Reduce Malicious Network TrafficMarianne Shaw. [doi]
- Strider Typo-Patrol: Discovery and Analysis of Systematic Typo-SquattingYi-Min Wang, Doug Beck, Jeffrey Wang, Chad Verbowski, Brad Daniels. [doi]