Number of items: 6.
Dietrich, Christian J. and Rossow, Christian and Pohlmann, Norbert
(2013)
CoCoSpot: Clustering and recognizing botnet command and control channels using traffic analysis.
Computer Networks, 57 (2).
475–486.
Dietrich, Christian J. and Rossow, Christian and Pohlmann, Norbert
(2013)
Exploiting visual appearance to cluster and detect rogue software.
Rossow, Christian and Andriesse, Dennis and Werner, Tillmann and Stone-Gross, Brett and Plohmann, Daniel and Dietrich, Christian J. and Bos, Herbert
(2013)
SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets.
Grier, Chris and Ballard, Lucas and Caballero, Juan and Chachra, Neha and Dietrich, Christian J. and Levchenko, Kirill and Mavrommatis, Panayiotis and McCoy, Damon and Nappa, Antonio and Pitsillidis, Andreas and Provos, Niels and Rafique, M. Zubair and Rajab, Moheeb Abu and Rossow, Christian and Thomas, Kurt and Paxson, Vern and Savage, Stefan and Voelker, Geoffrey M.
(2012)
Manufacturing compromise: the emergence of exploit-as-a-service.
Rossow, Christian and Dietrich, Christian J. and Grier, Chris and Kreibich, Christian and Paxson, Vern and Pohlmann, Norbert and Bos, Herbert and van Steen, Maarten
(2012)
Prudent Practices for Designing Malware Experiments: Status Quo and Outlook.
Dietrich, Christian J. and Rossow, Christian and Freiling, Felix C. and Bos, Herbert and van Steen, Maarten and Pohlmann, Norbert
(2011)
On Botnets That Use DNS for Command and Control.
This list was generated on Sat Nov 23 05:51:52 2024 CET.