Cent, five cent, ten cent, dollar: hitting botnets where it really hurts (DOI)
Richard Ford, Sarah Gordon
Dark application communities (DOI)
Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis
Challenging the anomaly detection paradigm: a provocative discussion (DOI)
Carrie Gates, Carol Taylor
Inconsistency in deception for defense (DOI)
Vicentiu Neagoe, Matt Bishop
Sanitization models and their limitations (DOI)
R. Crawford, M. Bishop, B. Bhumiratana, L. Clark, K. Levitt
Large-scale collection and sanitization of network security data: risks and challenges (DOI)
Phillip Porras, Vitaly Shmatikov
Googling considered harmful (DOI)
Gregory Conti
A pact with the devil (DOI)
Mike Bond, George Danezis
E-Prime for security: a new security paradigm (DOI)
Steven J. Greenwald
Diffusion and graph spectral methods for network forensic analysis (DOI)
Wei Wang, Thomas E. Daniels
PKI design for the real world (DOI)
Peter Gutmann