


default search action
1st BADGERS@EuroSys 2011: Salzburg, Austria
- Engin Kirda, Thorsten Holz:

Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS@EuroSys 2011, Salzburg, Austria, April 10, 2011. ACM 2011, ISBN 978-1-4503-0768-0 - Pablo Perez San-José, Susana de la Fuente Rodriguez:

Study on information security and e-Trust in Spanish households. 1-6 - Ang Cui, Salvatore J. Stolfo:

Reflections on the engineering and operation of a large-scale embedded device vulnerability scanner. 8-18 - Frédéric Massicotte, Mathieu Couture:

Blueprints of a lightweight automated experimentation system: a building block towards experimental cyber security. 19-28 - Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Masashi Eto, Daisuke Inoue, Koji Nakao:

Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation. 29-36 - Masashi Eto, Daisuke Inoue, Jungsuk Song, Junji Nakazato, Kazuhiro Ohtaka, Koji Nakao:

nicter: a large-scale network incident analysis system: case studies for understanding threat landscape. 37-45 - Corrado Leita, Marco Cova:

HARMUR: storing and analyzing historic data on malicious domains. 46-53 - Ian M. Molloy, Jorge Lobo

, Suresh Chari:
Adversaries' Holy Grail: access control analytics. 54-61 - Farnaz Moradi, Magnus Almgren

, Wolfgang John
, Tomas Olovsson, Philippas Tsigas
:
On collection of large-scale multi-purpose datasets on internet backbone links. 62-69 - Youngja Park, Stephen C. Gates, Wilfried Teiken, Pau-Chen Cheng:

An experimental study on the measurement of data sensitivity. 70-77 - Christian Rossow, Christian J. Dietrich, Herbert Bos

, Lorenzo Cavallaro
, Maarten van Steen
, Felix C. Freiling, Norbert Pohlmann:
Sandnet: network traffic analysis of malicious software. 78-88 - Tudor Dumitras, Darren Shou:

Toward a standard benchmark for computer security research: the worldwide intelligence network environment (WINE). 89-96 - Jody R. Westby:

Legal issues associated with data collection & sharing. 97-102 - Brian Trammell

, Jan Seedorf, Giuseppe Bianchi
:
An architectural solution for data exchange in cooperative network security research. 103-104 - Charlotte Scheper, Susanna Cantor, Douglas Maughan:

PREDICT: a trusted framework for sharing data for cyber security research. 105-106 - Federico Maggi

, Alessandro Sisto, Stefano Zanero
:
A social-engineering-centric data collection initiative to study phishing. 107-108

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














