Author:
Sood Aditya K.,Enbody Richard J.,Bansal Rohit
Subject
Computer Networks and Communications
Reference24 articles.
1. B. Stone-Gross, M. Cova, C. Kruegel, G. Vigna, Peering through the iframe, INFOCOM, 2011 Proceedings IEEE, 10–15 April, 2011, pp. 411–415.
2. A. Sood, R. Enbody, Browser Exploit packs – death by bundled exploits, in: Proceedings of 21st Annual Virus Bulletin Conference, Barcelona, Spain, 2011.
3. D. Moore, G. Voelker, S. Savage, Inferring internet denial of service activity, in: Usenix Security Symposium, 2001.
4. A. Ramachandran, N. Feamster. Understanding the network-level behavior of spammers, in: ACM SIGCOMM, 2006.
5. S. Saroiu, S. Gribble, H. Levy, Measurement and Analysis of Spyware in a University Environment. In Networked Systems Design and Implementation (NSDI), 2004.
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献