Design of SMS commanded-and-controlled and P2P-structured mobile botnets Y Zeng, KG Shin, X Hu Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012 | 121 | 2012 |
Detection of botnets using combined host-and network-level information Y Zeng, X Hu, KG Shin 2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010 | 121 | 2010 |
Open WiFi networks: Lethal weapons for botnets? M Knysz, X Hu, Y Zeng, KG Shin 2012 Proceedings IEEE INFOCOM, 2631-2635, 2012 | 22 | 2012 |
On detection of current and next-generation botnets Y Zeng University of Michigan, 2012 | 19 | 2012 |
How vulnerable are unprotected machines on the Internet? YG Zeng, D Coffey, J Viega International Conference on Passive and Active Network Measurement, 224-234, 2014 | 13 | 2014 |
Identifying email threats using predictive analysis YG Zeng 2017 International Conference on Cyber Security And Protection Of Digital …, 2017 | 10 | 2017 |
Containment of network worms via per-process rate-limiting Y Zeng, X Hu, H Wang, KG Shin, A Bose Proceedings of the 4th international conference on Security and privacy in …, 2008 | 9 | 2008 |
Measuring the effectiveness of infrastructure-level detection of large-scale botnets Y Zeng, G Yan, S Eidenbenz, KG Shin 2011 IEEE Nineteenth IEEE International Workshop on Quality of Service, 1-9, 2011 | 6 | 2011 |
Design of SMS Commandedand-Controlled and P2P-Structured Mobile Botnet, The University of Michigan Y Zeng, X Hu, KG Shin Ann Arbor, MI, 48109-2121, 0 | 4 | |
On detection of storm botnets Y Zeng, KG Shin | 1 | 2013 |
The Study and Detection of Storm Botnets Y Zeng, KG Shin | | |