An Analysis of Rogue AV Campaigns
- 1 January 2010
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 15 references indexed in Scilit:
- Your botnet is my botnetPublished by Association for Computing Machinery (ACM) ,2009
- So long, and no thanks for the externalitiesPublished by Association for Computing Machinery (ACM) ,2009
- The WOMBAT Attack Attribution Method: Some ResultsLecture Notes in Computer Science, 2009
- Learning More about the Underground Economy: A Case-Study of Keyloggers and DropzonesLecture Notes in Computer Science, 2009
- Addressing the attack attribution problem using knowledge discovery and multi-criteria fuzzy decision-makingPublished by Association for Computing Machinery (ACM) ,2009
- SpamalyticsPublished by Association for Computing Machinery (ACM) ,2008
- Examining the impact of website take-down on phishingPublished by Association for Computing Machinery (ACM) ,2007
- A multifaceted approach to understanding the botnet phenomenonPublished by Association for Computing Machinery (ACM) ,2006
- A technique for counting natted hostsPublished by Association for Computing Machinery (ACM) ,2002
- Multidimensional Scaling, Tree-Fitting, and ClusteringScience, 1980