BibTeX records: Elizabeth Stinson

download as .bib file

@inproceedings{DBLP:conf/uss/BriesemeisterDLSTDKSOM10,
  author    = {Linda Briesemeister and
               Steven Dawson and
               Patrick Lincoln and
               Hassen Sa{\"{\i}}di and
               Jim Thornton and
               Glenn Durfee and
               Peter C. S. Kwan and
               Elizabeth Stinson and
               Adam J. Oliner and
               John C. Mitchell},
  title     = {Homogeneity as an Advantage: It Takes a Community to Protect an Application},
  booktitle = {2010 Workshop on Collaborative Methods for Security and Privacy, CollSec'10,
               Washington, D.C., USA, August 10, 2010},
  year      = {2010},
  crossref  = {DBLP:conf/uss/2010collsec},
  url       = {https://www.usenix.org/conference/collsec10/homogeneity-advantage-it-takes-community-protect-application},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/BriesemeisterDLSTDKSOM10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MartignoniSFJM08,
  author    = {Lorenzo Martignoni and
               Elizabeth Stinson and
               Matt Fredrikson and
               Somesh Jha and
               John C. Mitchell},
  title     = {A Layered Architecture for Detecting Malicious Behaviors},
  booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium,
               {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  pages     = {78--97},
  year      = {2008},
  crossref  = {DBLP:conf/raid/2008},
  url       = {https://doi.org/10.1007/978-3-540-87403-4\_5},
  doi       = {10.1007/978-3-540-87403-4\_5},
  timestamp = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/raid/MartignoniSFJM08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/StinsonM08,
  author    = {Elizabeth Stinson and
               John C. Mitchell},
  title     = {Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection
               Methods},
  booktitle = {2nd {USENIX} Workshop on Offensive Technologies, WOOT'08, San Jose,
               CA, USA, July 28, 2008, Proceedings},
  year      = {2008},
  crossref  = {DBLP:conf/uss/2008woot},
  url       = {http://www.usenix.org/events/woot08/tech/full\_papers/stinson/stinson.pdf},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/StinsonM08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/StinsonM08,
  author    = {Elizabeth Stinson and
               John C. Mitchell},
  title     = {Characterizing Bots' Remote Control Behavior},
  booktitle = {Botnet Detection: Countering the Largest Security Threat},
  pages     = {45--64},
  year      = {2008},
  crossref  = {DBLP:series/ais/36},
  url       = {https://doi.org/10.1007/978-0-387-68768-1\_3},
  doi       = {10.1007/978-0-387-68768-1\_3},
  timestamp = {Tue, 16 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/series/ais/StinsonM08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/StinsonM07,
  author    = {Elizabeth Stinson and
               John C. Mitchell},
  title     = {Characterizing Bots' Remote Control Behavior},
  booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment,
               4th International Conference, {DIMVA} 2007, Lucerne, Switzerland,
               July 12-13, 2007, Proceedings},
  pages     = {89--108},
  year      = {2007},
  crossref  = {DBLP:conf/dimva/2007},
  url       = {https://doi.org/10.1007/978-3-540-73614-1\_6},
  doi       = {10.1007/978-3-540-73614-1\_6},
  timestamp = {Tue, 14 May 2019 10:00:47 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dimva/StinsonM07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2010collsec,
  editor    = {Nadav Aharony and
               Yaniv Altshuler and
               Yuval Elovici},
  title     = {2010 Workshop on Collaborative Methods for Security and Privacy, CollSec'10,
               Washington, D.C., USA, August 10, 2010},
  publisher = {{USENIX} Association},
  year      = {2010},
  url       = {https://www.usenix.org/conference/collsec10},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2010collsec},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2008,
  editor    = {Richard Lippmann and
               Engin Kirda and
               Ari Trachtenberg},
  title     = {Recent Advances in Intrusion Detection, 11th International Symposium,
               {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5230},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-87403-4},
  doi       = {10.1007/978-3-540-87403-4},
  isbn      = {978-3-540-87402-7},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/raid/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2008woot,
  editor    = {Dan Boneh and
               Tal Garfinkel and
               Dug Song},
  title     = {2nd {USENIX} Workshop on Offensive Technologies, WOOT'08, San Jose,
               CA, USA, July 28, 2008, Proceedings},
  publisher = {{USENIX} Association},
  year      = {2008},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2008woot},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/36,
  editor    = {Wenke Lee and
               Cliff Wang and
               David Dagon},
  title     = {Botnet Detection: Countering the Largest Security Threat},
  series    = {Advances in Information Security},
  volume    = {36},
  publisher = {Springer},
  year      = {2008},
  isbn      = {978-0-387-68768-1},
  timestamp = {Wed, 19 Nov 2008 13:49:56 +0100},
  biburl    = {https://dblp.org/rec/bib/series/ais/36},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dimva/2007,
  editor    = {Bernhard M. H{\"{a}}mmerli and
               Robin Sommer},
  title     = {Detection of Intrusions and Malware, and Vulnerability Assessment,
               4th International Conference, {DIMVA} 2007, Lucerne, Switzerland,
               July 12-13, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4579},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-73614-1},
  doi       = {10.1007/978-3-540-73614-1},
  isbn      = {978-3-540-73613-4},
  timestamp = {Tue, 14 May 2019 10:00:47 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dimva/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics