关注
Brett Stone-Gross
标题
引用次数
引用次数
年份
Your botnet is my botnet: analysis of a botnet takeover
B Stone-Gross, M Cova, L Cavallaro, B Gilbert, M Szydlowski, ...
Proceedings of the 16th ACM conference on Computer and communications …, 2009
9812009
The Underground Economy of Spam: A Botmaster's Perspective of Coordinating {Large-Scale} Spam Campaigns
B Stone-Gross, T Holz, G Stringhini, G Vigna
4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11), 2011
2392011
Sok: P2pwned-modeling and evaluating the resilience of peer-to-peer botnets
C Rossow, D Andriesse, T Werner, B Stone-Gross, D Plohmann, ...
2013 IEEE symposium on security and privacy, 97-111, 2013
2382013
The underground economy of fake antivirus software
B Stone-Gross, R Abman, RA Kemmerer, C Kruegel, DG Steigerwald, ...
Economics of information security and privacy III, 55-78, 2013
1732013
Understanding fraudulent activities in online ad exchanges
B Stone-Gross, R Stevens, A Zarras, R Kemmerer, C Kruegel, G Vigna
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011
1692011
Highly resilient peer-to-peer botnets are here: An analysis of gameover zeus
D Andriesse, C Rossow, B Stone-Gross, D Plohmann, H Bos
2013 8th International Conference on Malicious and Unwanted Software:" The …, 2013
1622013
Fire: Finding rogue networks
B Stone-Gross, C Kruegel, K Almeroth, A Moser, E Kirda
2009 Annual Computer Security Applications Conference, 231-240, 2009
1422009
Analysis of a botnet takeover
B Stone-Gross, M Cova, B Gilbert, R Kemmerer, C Kruegel, G Vigna
IEEE Security & Privacy 9 (1), 64-72, 2010
1282010
Two years of short urls internet measurement: security threats and countermeasures
F Maggi, A Frossi, S Zanero, G Stringhini, B Stone-Gross, C Kruegel, ...
proceedings of the 22nd international conference on World Wide Web, 861-872, 2013
882013
{BOTMAGNIFIER}: Locating Spambots on the Internet
G Stringhini, T Holz, B Stone-Gross, C Kruegel, G Vigna
20th USENIX Security Symposium (USENIX Security 11), 2011
682011
MIST: Cellular data network measurement for mobile applications
MP Wittie, B Stone-Gross, KC Almeroth, EM Belding
2007 Fourth International Conference on Broadband Communications, Networks …, 2007
392007
Peering through the iframe
B Stone-Gross, M Cova, C Kruegel, G Vigna
2011 Proceedings IEEE INFOCOM, 411-415, 2011
362011
The lifecycle of peer-to-peer (gameover) zeus
B Stone-Gross
Tech. rep., Dell Secure Works, 2012
172012
Malware in IEEE 802.11 wireless networks
B Stone-Gross, C Wilson, K Almeroth, E Belding, H Zheng, ...
Passive and Active Network Measurement: 9th International Conference, PAM …, 2008
172008
VeriKey: A dynamic certificate verification system for public key exchanges
B Stone-Gross, D Sigal, R Cohn, J Morse, K Almeroth, C Kruegel
Detection of Intrusions and Malware, and Vulnerability Assessment: 5th …, 2008
82008
Malware analysis of the lurk downloader
B Stone-Gross
Retrieved February 13, 2016, 2014
72014
The underground economy of fake antivirus software
D Steigerwald, G Vigna, C Kruegel, R Kemmerer, R Abman, ...
22011
Your botnet is my botnet
B Stone-Gross, M Cova, L Cavallaro, B Gilbert, M Szydlowski, ...
Proceedings of the 16th ACM conference on Computer and communications …, 0
2
Measures to understand and thwart organized cybercrime
B Stone-Gross
University of California at Santa Barbara, 2011
12011
A Botmaster’s Perspective of Coordinating Large-Scale Spam Campaigns
B Stone-Gross, T Holz, G Stringhini, G Vigna
GSWC 2011, 29, 2011
2011
系统目前无法执行此操作,请稍后再试。
文章 1–20