Jump to:
J |
K |
M |
P |
S |
WNumber of items: 6.
J
Jonker, Mattijs and King, Alistair and Krupp, Johannes and Rossow, Christian and Sperotto, Anna and Dainotti, Alberto
(2017)
Millions of Targets Under Attack: A Macroscopic Characterization of the DoS Ecosystem.
K
Krupp, Johannes and Karami, Mohammad and Rossow, Christian and McCoy, Damon and Backes, Michael
(2017)
Linking Amplification DDoS Attacks to Booter Services.
M
Maisuradze, Giorgi and Backes, Michael and Rossow, Christian
(2017)
Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code.
P
Pellegrino, Giancarlo and Johns, Martin and Koch, Simon and Backes, Michael and Rossow, Christian
(2017)
Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs.
S
Simeonovski, Milivoj and Pellegrino, Giancarlo and Rossow, Christian and Backes, Michael
(2017)
Who Controls the Internet? Analyzing Global Threats using Property Graph Traversals.
W
Weigel, Martin and Steimle, Jürgen
(2017)
DeformWear: Deformation Input on Tiny Wearable Devices.
IMWUT, 1 (2).
28:1–28:23.
This list was generated on Thu Nov 21 13:07:59 2024 CET.