![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
1st BADGERS@EuroSys 2011: Salzburg, Austria
- Engin Kirda, Thorsten Holz:
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS@EuroSys 2011, Salzburg, Austria, April 10, 2011. ACM 2011, ISBN 978-1-4503-0768-0 - Pablo Perez San-José, Susana de la Fuente Rodriguez:
Study on information security and e-Trust in Spanish households. 1-6 - Ang Cui, Salvatore J. Stolfo:
Reflections on the engineering and operation of a large-scale embedded device vulnerability scanner. 8-18 - Frédéric Massicotte, Mathieu Couture:
Blueprints of a lightweight automated experimentation system: a building block towards experimental cyber security. 19-28 - Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Masashi Eto, Daisuke Inoue, Koji Nakao:
Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation. 29-36 - Masashi Eto, Daisuke Inoue, Jungsuk Song, Junji Nakazato, Kazuhiro Ohtaka, Koji Nakao:
nicter: a large-scale network incident analysis system: case studies for understanding threat landscape. 37-45 - Corrado Leita, Marco Cova:
HARMUR: storing and analyzing historic data on malicious domains. 46-53 - Ian M. Molloy, Jorge Lobo
, Suresh Chari:
Adversaries' Holy Grail: access control analytics. 54-61 - Farnaz Moradi, Magnus Almgren
, Wolfgang John
, Tomas Olovsson, Philippas Tsigas
:
On collection of large-scale multi-purpose datasets on internet backbone links. 62-69 - Youngja Park, Stephen C. Gates, Wilfried Teiken, Pau-Chen Cheng:
An experimental study on the measurement of data sensitivity. 70-77 - Christian Rossow, Christian J. Dietrich, Herbert Bos
, Lorenzo Cavallaro
, Maarten van Steen
, Felix C. Freiling, Norbert Pohlmann:
Sandnet: network traffic analysis of malicious software. 78-88 - Tudor Dumitras, Darren Shou:
Toward a standard benchmark for computer security research: the worldwide intelligence network environment (WINE). 89-96 - Jody R. Westby:
Legal issues associated with data collection & sharing. 97-102 - Brian Trammell
, Jan Seedorf, Giuseppe Bianchi
:
An architectural solution for data exchange in cooperative network security research. 103-104 - Charlotte Scheper, Susanna Cantor, Douglas Maughan:
PREDICT: a trusted framework for sharing data for cyber security research. 105-106 - Federico Maggi
, Alessandro Sisto, Stefano Zanero
:
A social-engineering-centric data collection initiative to study phishing. 107-108
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.