Before we knew it
- 16 October 2012
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
Abstract
No abstract availableThis publication has 9 references indexed in Scilit:
- Polonium: Tera-Scale Graph Mining and Inference for Malware DetectionPublished by Society for Industrial & Applied Mathematics (SIAM) ,2011
- Toward a standard benchmark for computer security researchPublished by Association for Computing Machinery (ACM) ,2011
- Empirical Estimates and Observations of 0Day VulnerabilitiesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
- Is finding security holes a good idea?IEEE Security & Privacy, 2005
- Economies of disclosureACM SIGCAS Computers and Society, 2004
- The nonsecurity of secrecyCommunications of the ACM, 2004
- Locks and full disclosureIEEE Security & Privacy, 2003
- Windows of vulnerability: a case study analysisComputer, 2000