BibTeX records: Christian Kreibich

download as .bib file

@inproceedings{DBLP:conf/ndss/RazaghpanahNVSA18,
  author    = {Abbas Razaghpanah and
               Rishab Nithyanand and
               Narseo Vallina{-}Rodriguez and
               Srikanth Sundaresan and
               Mark Allman and
               Christian Kreibich and
               Phillipa Gill},
  title     = {Apps, Trackers, Privacy, and Regulators: {A} Global Study of the Mobile
               Tracking Ecosystem},
  booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS}
               2018, San Diego, California, USA, February 18-21, 2018},
  year      = {2018},
  crossref  = {DBLP:conf/ndss/2018},
  url       = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2018/02/ndss2018\_05B-3\_Razaghpanah\_paper.pdf},
  timestamp = {Thu, 09 Aug 2018 10:56:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/RazaghpanahNVSA18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotnets/CallejoKVCGKWC17,
  author    = {Patricia Callejo and
               Conor Kelton and
               Narseo Vallina{-}Rodriguez and
               Rub{\'{e}}n Cuevas and
               Oliver Gasser and
               Christian Kreibich and
               Florian Wohlfart and
               {\'{A}}ngel Cuevas},
  title     = {Opportunities and Challenges of Ad-based Measurements from the Edge
               of the Network},
  booktitle = {Proceedings of the 16th {ACM} Workshop on Hot Topics in Networks,
               Palo Alto, CA, USA, HotNets 2017, November 30 - December 01, 2017},
  pages     = {87--93},
  year      = {2017},
  crossref  = {DBLP:conf/hotnets/2017},
  url       = {https://doi.org/10.1145/3152434.3152895},
  doi       = {10.1145/3152434.3152895},
  timestamp = {Tue, 06 Nov 2018 16:58:14 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/hotnets/CallejoKVCGKWC17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NappaMTKC16,
  author    = {Antonio Nappa and
               Rana Faisal Munir and
               Irfan Khan Tanoli and
               Christian Kreibich and
               Juan Caballero},
  title     = {RevProbe: detecting silent reverse proxies in malicious server infrastructures},
  booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
               {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages     = {101--112},
  year      = {2016},
  crossref  = {DBLP:conf/acsac/2016},
  url       = {http://dl.acm.org/citation.cfm?id=2991093},
  timestamp = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/NappaMTKC16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/RichterWVABFKWP16,
  author    = {Philipp Richter and
               Florian Wohlfart and
               Narseo Vallina{-}Rodriguez and
               Mark Allman and
               Randy Bush and
               Anja Feldmann and
               Christian Kreibich and
               Nicholas Weaver and
               Vern Paxson},
  title     = {A Multi-perspective Analysis of Carrier-Grade {NAT} Deployment},
  booktitle = {Proceedings of the 2016 {ACM} on Internet Measurement Conference,
               {IMC} 2016, Santa Monica, CA, USA, November 14-16, 2016},
  pages     = {215--229},
  year      = {2016},
  crossref  = {DBLP:conf/imc/2016},
  url       = {http://dl.acm.org/citation.cfm?id=2987474},
  timestamp = {Tue, 06 Nov 2018 11:07:19 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/RichterWVABFKWP16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RichterWVABFKWP16,
  author    = {Philipp Richter and
               Florian Wohlfart and
               Narseo Vallina{-}Rodriguez and
               Mark Allman and
               Randy Bush and
               Anja Feldmann and
               Christian Kreibich and
               Nicholas Weaver and
               Vern Paxson},
  title     = {A Multi-perspective Analysis of Carrier-Grade {NAT} Deployment},
  journal   = {CoRR},
  volume    = {abs/1605.05606},
  year      = {2016},
  url       = {http://arxiv.org/abs/1605.05606},
  archivePrefix = {arXiv},
  eprint    = {1605.05606},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/RichterWVABFKWP16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Vallina-Rodriguez16,
  author    = {Narseo Vallina{-}Rodriguez and
               Srikanth Sundaresan and
               Abbas Razaghpanah and
               Rishab Nithyanand and
               Mark Allman and
               Christian Kreibich and
               Phillipa Gill},
  title     = {Tracking the Trackers: Towards Understanding the Mobile Advertising
               and Tracking Ecosystem},
  journal   = {CoRR},
  volume    = {abs/1609.07190},
  year      = {2016},
  url       = {http://arxiv.org/abs/1609.07190},
  archivePrefix = {arXiv},
  eprint    = {1609.07190},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/Vallina-Rodriguez16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/Vallina-Rodriguez15,
  author    = {Narseo Vallina{-}Rodriguez and
               Srikanth Sundaresan and
               Christian Kreibich and
               Nicholas Weaver and
               Vern Paxson},
  title     = {Beyond the Radio: Illuminating the Higher Layers of Mobile Networks},
  booktitle = {Proceedings of the 13th Annual International Conference on Mobile
               Systems, Applications, and Services, MobiSys 2015, Florence, Italy,
               May 19-22, 2015},
  pages     = {375--387},
  year      = {2015},
  crossref  = {DBLP:conf/mobisys/2015},
  url       = {https://doi.org/10.1145/2742647.2742675},
  doi       = {10.1145/2742647.2742675},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/mobisys/Vallina-Rodriguez15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/Vallina-Rodriguez15,
  author    = {Narseo Vallina{-}Rodriguez and
               Srikanth Sundaresan and
               Christian Kreibich and
               Vern Paxson},
  title     = {Header Enrichment or {ISP} Enrichment?: Emerging Privacy Threats in
               Mobile Networks},
  booktitle = {Proceedings of the 2015 {ACM} {SIGCOMM} Workshop on Hot Topics in
               Middleboxes and Network Function Virtualization, HotMiddlebox@SIGCOMM
               2015, London, United Kingdom, August 21, 2015},
  pages     = {25--30},
  year      = {2015},
  crossref  = {DBLP:conf/sigcomm/2015hotmiddlebox},
  url       = {https://doi.org/10.1145/2785989.2786002},
  doi       = {10.1145/2785989.2786002},
  timestamp = {Tue, 06 Nov 2018 11:07:11 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigcomm/Vallina-Rodriguez15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RazaghpanahVSKG15,
  author    = {Abbas Razaghpanah and
               Narseo Vallina{-}Rodriguez and
               Srikanth Sundaresan and
               Christian Kreibich and
               Phillipa Gill and
               Mark Allman and
               Vern Paxson},
  title     = {Haystack: In Situ Mobile Traffic Analysis in User Space},
  journal   = {CoRR},
  volume    = {abs/1510.01419},
  year      = {2015},
  url       = {http://arxiv.org/abs/1510.01419},
  archivePrefix = {arXiv},
  eprint    = {1510.01419},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/RazaghpanahVSKG15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/Vallina-RodriguezAKWP14,
  author    = {Narseo Vallina{-}Rodriguez and
               Johanna Amann and
               Christian Kreibich and
               Nicholas Weaver and
               Vern Paxson},
  title     = {A Tangled Mass: The Android Root Certificate Stores},
  booktitle = {Proceedings of the 10th {ACM} International on Conference on emerging
               Networking Experiments and Technologies, CoNEXT 2014, Sydney, Australia,
               December 2-5, 2014},
  pages     = {141--148},
  year      = {2014},
  crossref  = {DBLP:conf/conext/2014},
  url       = {https://doi.org/10.1145/2674005.2675015},
  doi       = {10.1145/2674005.2675015},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/conext/Vallina-RodriguezAKWP14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/WeaverKDP14,
  author    = {Nicholas Weaver and
               Christian Kreibich and
               Martin Dam and
               Vern Paxson},
  title     = {Here Be Web Proxies},
  booktitle = {Passive and Active Measurement - 15th International Conference, {PAM}
               2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedings},
  pages     = {183--192},
  year      = {2014},
  crossref  = {DBLP:conf/pam/2014},
  url       = {https://doi.org/10.1007/978-3-319-04918-2\_18},
  doi       = {10.1007/978-3-319-04918-2\_18},
  timestamp = {Tue, 23 May 2017 01:12:12 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pam/WeaverKDP14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/HaoTPFKGH13,
  author    = {Shuang Hao and
               Matthew Thomas and
               Vern Paxson and
               Nick Feamster and
               Christian Kreibich and
               Chris Grier and
               Scott Hollenbeck},
  title     = {Understanding the domain registration behavior of spammers},
  booktitle = {Proceedings of the 2013 Internet Measurement Conference, {IMC} 2013,
               Barcelona, Spain, October 23-25, 2013},
  pages     = {63--76},
  year      = {2013},
  crossref  = {DBLP:conf/imc/2013},
  url       = {https://doi.org/10.1145/2504730.2504753},
  doi       = {10.1145/2504730.2504753},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/HaoTPFKGH13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/McCoyDKVS12,
  author    = {Damon McCoy and
               Hitesh Dharmdasani and
               Christian Kreibich and
               Geoffrey M. Voelker and
               Stefan Savage},
  title     = {Priceless: the role of payments in abuse-advertised goods},
  booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12,
               Raleigh, NC, USA, October 16-18, 2012},
  pages     = {845--856},
  year      = {2012},
  crossref  = {DBLP:conf/ccs/2012},
  url       = {https://doi.org/10.1145/2382196.2382285},
  doi       = {10.1145/2382196.2382285},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/McCoyDKVS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/DhawanSTKAWP12,
  author    = {Mohan Dhawan and
               Justin Samuel and
               Renata Teixeira and
               Christian Kreibich and
               Mark Allman and
               Nicholas Weaver and
               Vern Paxson},
  title     = {Fathom: a browser-based network measurement platform},
  booktitle = {Proceedings of the 12th {ACM} {SIGCOMM} Internet Measurement Conference,
               {IMC} '12, Boston, MA, USA, November 14-16, 2012},
  pages     = {73--86},
  year      = {2012},
  crossref  = {DBLP:conf/imc/2012},
  url       = {https://doi.org/10.1145/2398776.2398786},
  doi       = {10.1145/2398776.2398786},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/DhawanSTKAWP12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/DiCioccioTMK12,
  author    = {Lucas DiCioccio and
               Renata Teixeira and
               Martin May and
               Christian Kreibich},
  title     = {Probe and Pray: Using UPnP for Home Network Measurements},
  booktitle = {Passive and Active Measurement - 13th International Conference, {PAM}
               2012, Vienna, Austria, March 12-14th, 2012. Proceedings},
  pages     = {96--105},
  year      = {2012},
  crossref  = {DBLP:conf/pam/2012},
  url       = {https://doi.org/10.1007/978-3-642-28537-0\_10},
  doi       = {10.1007/978-3-642-28537-0\_10},
  timestamp = {Tue, 23 May 2017 01:12:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pam/DiCioccioTMK12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/HalvorsonSMFKWLP12,
  author    = {Tristan Halvorson and
               Janos Szurdi and
               Gregor Maier and
               M{\'{a}}rk F{\'{e}}legyh{\'{a}}zi and
               Christian Kreibich and
               Nicholas Weaver and
               Kirill Levchenko and
               Vern Paxson},
  title     = {The {BIZ} Top-Level Domain: Ten Years Later},
  booktitle = {Passive and Active Measurement - 13th International Conference, {PAM}
               2012, Vienna, Austria, March 12-14th, 2012. Proceedings},
  pages     = {221--230},
  year      = {2012},
  crossref  = {DBLP:conf/pam/2012},
  url       = {https://doi.org/10.1007/978-3-642-28537-0\_22},
  doi       = {10.1007/978-3-642-28537-0\_22},
  timestamp = {Tue, 23 May 2017 01:12:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pam/HalvorsonSMFKWLP12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RossowDGKPPBS12,
  author    = {Christian Rossow and
               Christian J. Dietrich and
               Chris Grier and
               Christian Kreibich and
               Vern Paxson and
               Norbert Pohlmann and
               Herbert Bos and
               Maarten van Steen},
  title     = {Prudent Practices for Designing Malware Experiments: Status Quo and
               Outlook},
  booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012,
               San Francisco, California, {USA}},
  pages     = {65--79},
  year      = {2012},
  crossref  = {DBLP:conf/sp/2012},
  url       = {https://doi.org/10.1109/SP.2012.14},
  doi       = {10.1109/SP.2012.14},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/RossowDGKPPBS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/McCoyPJWKKVSL12,
  author    = {Damon McCoy and
               Andreas Pitsillidis and
               Grant Jordan and
               Nicholas Weaver and
               Christian Kreibich and
               Brian Krebs and
               Geoffrey M. Voelker and
               Stefan Savage and
               Kirill Levchenko},
  title     = {PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate
               Programs},
  booktitle = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA,
               USA, August 8-10, 2012},
  pages     = {1--16},
  year      = {2012},
  crossref  = {DBLP:conf/uss/2012},
  url       = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/mccoy},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/McCoyPJWKKVSL12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/MillerPGKP11,
  author    = {Brad Miller and
               Paul Pearce and
               Chris Grier and
               Christian Kreibich and
               Vern Paxson},
  title     = {What's Clicking What? Techniques and Innovations of Today's Clickbots},
  booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment
               - 8th International Conference; {DIMVA} 2011, Amsterdam, The Netherlands,
               July 7-8, 2011. Proceedings},
  pages     = {164--183},
  year      = {2011},
  crossref  = {DBLP:conf/dimva/2011},
  url       = {https://doi.org/10.1007/978-3-642-22424-9\_10},
  doi       = {10.1007/978-3-642-22424-9\_10},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dimva/MillerPGKP11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/KreibichWKCP11,
  author    = {Christian Kreibich and
               Nicholas Weaver and
               Chris Kanich and
               Weidong Cui and
               Vern Paxson},
  title     = {{GQ:} practical containment for measuring modern malware systems},
  booktitle = {Proceedings of the 11th {ACM} {SIGCOMM} Internet Measurement Conference,
               {IMC} '11, Berlin, Germany, November 2-, 2011},
  pages     = {397--412},
  year      = {2011},
  crossref  = {DBLP:conf/imc/2011},
  url       = {https://doi.org/10.1145/2068816.2068854},
  doi       = {10.1145/2068816.2068854},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/KreibichWKCP11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/leet/LiuLFKMV11,
  author    = {He Liu and
               Kirill Levchenko and
               M{\'{a}}rk F{\'{e}}legyh{\'{a}}zi and
               Christian Kreibich and
               Gregor Maier and
               Geoffrey M. Voelker},
  title     = {On the Effects of Registrar-level Intervention},
  booktitle = {4th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
               {LEET} '11, Boston, MA, USA, March 29, 2011},
  year      = {2011},
  crossref  = {DBLP:conf/leet/2011},
  url       = {https://www.usenix.org/conference/leet11/effects-registrar-level-intervention},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/leet/LiuLFKMV11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/KreibichWMNP11,
  author    = {Christian Kreibich and
               Nicholas Weaver and
               Gregor Maier and
               Boris Nechaev and
               Vern Paxson},
  title     = {Experiences from Netalyzr with engaging users in end-system measurement},
  booktitle = {Proceedings of the first {ACM} {SIGCOMM} workshop on Measurements
               up the stack, W-MUST@SIGCOMM 2011, Toronto, Ontario, Canada, August
               19, 2011},
  pages     = {25--30},
  year      = {2011},
  crossref  = {DBLP:conf/sigcomm/2011wmust},
  url       = {https://doi.org/10.1145/2018602.2018609},
  doi       = {10.1145/2018602.2018609},
  timestamp = {Tue, 06 Nov 2018 11:07:11 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigcomm/KreibichWMNP11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LevchenkoPCEFGHKKLMWPVS11,
  author    = {Kirill Levchenko and
               Andreas Pitsillidis and
               Neha Chachra and
               Brandon Enright and
               M{\'{a}}rk F{\'{e}}legyh{\'{a}}zi and
               Chris Grier and
               Tristan Halvorson and
               Chris Kanich and
               Christian Kreibich and
               He Liu and
               Damon McCoy and
               Nicholas Weaver and
               Vern Paxson and
               Geoffrey M. Voelker and
               Stefan Savage},
  title     = {Click Trajectories: End-to-End Analysis of the Spam Value Chain},
  booktitle = {32nd {IEEE} Symposium on Security and Privacy, S{\&}P 2011, 22-25
               May 2011, Berkeley, California, {USA}},
  pages     = {431--446},
  year      = {2011},
  crossref  = {DBLP:conf/sp/2011},
  url       = {https://doi.org/10.1109/SP.2011.24},
  doi       = {10.1109/SP.2011.24},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/LevchenkoPCEFGHKKLMWPVS11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CaballeroGKP11,
  author    = {Juan Caballero and
               Chris Grier and
               Christian Kreibich and
               Vern Paxson},
  title     = {Measuring Pay-per-Install: The Commoditization of Malware Distribution},
  booktitle = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
               2011, Proceedings},
  year      = {2011},
  crossref  = {DBLP:conf/uss/2011},
  url       = {http://static.usenix.org/events/sec11/tech/full\_papers/Caballero.pdf},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/CaballeroGKP11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KanichWMHKLPVS11,
  author    = {Chris Kanich and
               Nicholas Weaver and
               Damon McCoy and
               Tristan Halvorson and
               Christian Kreibich and
               Kirill Levchenko and
               Vern Paxson and
               Geoffrey M. Voelker and
               Stefan Savage},
  title     = {Show Me the Money: Characterizing Spam-advertised Revenue},
  booktitle = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
               2011, Proceedings},
  year      = {2011},
  crossref  = {DBLP:conf/uss/2011},
  url       = {http://static.usenix.org/events/sec11/tech/full\_papers/Kanich.pdf},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/KanichWMHKLPVS11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WeaverKP11,
  author    = {Nicholas Weaver and
               Christian Kreibich and
               Vern Paxson},
  title     = {Redirecting {DNS} for Ads and Profit},
  booktitle = {{USENIX} Workshop on Free and Open Communications on the Internet,
               {FOCI} '11, San Francisco, CA, USA, August 8, 2011},
  year      = {2011},
  crossref  = {DBLP:conf/uss/2011foci},
  url       = {https://www.usenix.org/conference/foci11/redirecting-dns-ads-and-profit},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/WeaverKP11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/KreibichWNP10,
  author    = {Christian Kreibich and
               Nicholas Weaver and
               Boris Nechaev and
               Vern Paxson},
  title     = {Netalyzr: illuminating the edge network},
  booktitle = {Proceedings of the 10th {ACM} {SIGCOMM} Internet Measurement Conference,
               {IMC} 2010, Melbourne, Australia - November 1-3, 2010},
  pages     = {246--259},
  year      = {2010},
  crossref  = {DBLP:conf/imc/2010},
  url       = {https://doi.org/10.1145/1879141.1879173},
  doi       = {10.1145/1879141.1879173},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/KreibichWNP10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/leet/FelegyhaziKP10,
  author    = {M{\'{a}}rk F{\'{e}}legyh{\'{a}}zi and
               Christian Kreibich and
               Vern Paxson},
  title     = {On the Potential of Proactive Domain Blacklisting},
  booktitle = {3rd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
               {LEET} '10, San Jose, CA, USA, April 27, 2010},
  year      = {2010},
  crossref  = {DBLP:conf/leet/2010},
  url       = {https://www.usenix.org/conference/leet-10/potential-proactive-domain-blacklisting},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/leet/FelegyhaziKP10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/PitsillidisLKKVPWS10,
  author    = {Andreas Pitsillidis and
               Kirill Levchenko and
               Christian Kreibich and
               Chris Kanich and
               Geoffrey M. Voelker and
               Vern Paxson and
               Nicholas Weaver and
               Stefan Savage},
  title     = {Botnet Judo: Fighting Spam with Itself},
  booktitle = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March
               2010},
  year      = {2010},
  crossref  = {DBLP:conf/ndss/2010},
  url       = {http://www.isoc.org/isoc/conferences/ndss/10/pdf/12.pdf},
  timestamp = {Wed, 31 Aug 2011 13:59:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/PitsillidisLKKVPWS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dimva/2010,
  editor    = {Christian Kreibich and
               Marko Jahnke},
  title     = {Detection of Intrusions and Malware, and Vulnerability Assessment,
               7th International Conference, {DIMVA} 2010, Bonn, Germany, July 8-9,
               2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6201},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-14215-4},
  doi       = {10.1007/978-3-642-14215-4},
  isbn      = {978-3-642-14214-7},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dimva/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2010,
  editor    = {Somesh Jha and
               Robin Sommer and
               Christian Kreibich},
  title     = {Recent Advances in Intrusion Detection, 13th International Symposium,
               {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6307},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-15512-3},
  doi       = {10.1007/978-3-642-15512-3},
  isbn      = {978-3-642-15511-6},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/raid/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/KanichKLEVPS09,
  author    = {Chris Kanich and
               Christian Kreibich and
               Kirill Levchenko and
               Brandon Enright and
               Geoffrey M. Voelker and
               Vern Paxson and
               Stefan Savage},
  title     = {Spamalytics: an empirical analysis of spam marketing conversion},
  journal   = {Commun. {ACM}},
  volume    = {52},
  number    = {9},
  pages     = {99--107},
  year      = {2009},
  url       = {https://doi.org/10.1145/1562164.1562190},
  doi       = {10.1145/1562164.1562190},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/cacm/KanichKLEVPS09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CaballeroPKS09,
  author    = {Juan Caballero and
               Pongsin Poosankam and
               Christian Kreibich and
               Dawn Xiaodong Song},
  title     = {Dispatcher: enabling active botnet infiltration using automatic protocol
               reverse-engineering},
  booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
               Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages     = {621--634},
  year      = {2009},
  crossref  = {DBLP:conf/ccs/2009},
  url       = {https://doi.org/10.1145/1653662.1653737},
  doi       = {10.1145/1653662.1653737},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/CaballeroPKS09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/leet/KreibichKLEVPS09,
  author    = {Christian Kreibich and
               Chris Kanich and
               Kirill Levchenko and
               Brandon Enright and
               Geoffrey M. Voelker and
               Vern Paxson and
               Stefan Savage},
  title     = {Spamcraft: An Inside Look At Spam Campaign Orchestration},
  booktitle = {2nd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
               {LEET} '09, Boston, MA, USA, April 21, 2009},
  year      = {2009},
  crossref  = {DBLP:conf/leet/2009},
  url       = {https://www.usenix.org/conference/leet-09/spamcraft-inside-look-spam-campaign-orchestration},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/leet/KreibichKLEVPS09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KanichKLEVPS08,
  author    = {Chris Kanich and
               Christian Kreibich and
               Kirill Levchenko and
               Brandon Enright and
               Geoffrey M. Voelker and
               Vern Paxson and
               Stefan Savage},
  title     = {Spamalytics: an empirical analysis of spam marketing conversion},
  booktitle = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
               Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  pages     = {3--14},
  year      = {2008},
  crossref  = {DBLP:conf/ccs/2008},
  url       = {https://doi.org/10.1145/1455770.1455774},
  doi       = {10.1145/1455770.1455774},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/KanichKLEVPS08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/JuanKLP08,
  author    = {Leo Juan and
               Christian Kreibich and
               Chih{-}Hung Lin and
               Vern Paxson},
  title     = {A Tool for Offline and Live Testing of Evasion Resilience in Network
               Intrusion Detection Systems},
  booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment,
               5th International Conference, {DIMVA} 2008, Paris, France, July 10-11,
               2008. Proceedings},
  pages     = {267--278},
  year      = {2008},
  crossref  = {DBLP:conf/dimva/2008},
  url       = {https://doi.org/10.1007/978-3-540-70542-0\_14},
  doi       = {10.1007/978-3-540-70542-0\_14},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dimva/JuanKLP08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/KreibichKLEVPS08,
  author    = {Christian Kreibich and
               Chris Kanich and
               Kirill Levchenko and
               Brandon Enright and
               Geoffrey M. Voelker and
               Vern Paxson and
               Stefan Savage},
  title     = {On the Spam Campaign Trail},
  booktitle = {First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
               {LEET} '08, San Francisco, CA, USA, April 15, 2008, Proceedings},
  year      = {2008},
  crossref  = {DBLP:conf/nsdi/2008leet},
  url       = {http://www.usenix.org/events/leet08/tech/full\_papers/kreibich/kreibich.pdf},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nsdi/KreibichKLEVPS08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AllmanKPSW08,
  author    = {Mark Allman and
               Christian Kreibich and
               Vern Paxson and
               Robin Sommer and
               Nicholas Weaver},
  title     = {Principles for Developing Comprehensive Network Visibility},
  booktitle = {3rd {USENIX} Workshop on Hot Topics in Security, HotSec'08, San Jose,
               CA, USA, July 29, 2008, Proceedings},
  year      = {2008},
  crossref  = {DBLP:conf/uss/2008hotsec},
  url       = {http://www.usenix.org/events/hotsec08/tech/full\_papers/allman/allman.pdf},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/AllmanKPSW08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Kreibich07,
  author    = {Christian Peter Kreibich},
  title     = {Structural traffic analysis for network security monitoring},
  school    = {University of Cambridge, {UK}},
  year      = {2007},
  url       = {http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.613090},
  timestamp = {Mon, 05 Sep 2016 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/phd/ethos/Kreibich07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AllmanKPSW07,
  author    = {Mark Allman and
               Christian Kreibich and
               Vern Paxson and
               Robin Sommer and
               Nicholas Weaver},
  title     = {The Strengths of Weaker Identities: Opportunistic Personas},
  booktitle = {2nd {USENIX} Workshop on Hot Topics in Security, HotSec'07, Boston,
               MA, USA, August 7, 2007},
  year      = {2007},
  crossref  = {DBLP:conf/uss/2007hotsec},
  url       = {https://www.usenix.org/conference/hotsec-07/strengths-weaker-identities-opportunistic-personas},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/AllmanKPSW07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/CrowcroftK06,
  author    = {Jon Crowcroft and
               Christian Kreibich},
  title     = {Only 365 days left until the Sigcomm deadline},
  journal   = {Computer Communication Review},
  volume    = {36},
  number    = {5},
  pages     = {57--62},
  year      = {2006},
  url       = {https://doi.org/10.1145/1163593.1163603},
  doi       = {10.1145/1163593.1163603},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ccr/CrowcroftK06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/KreibichC06,
  author    = {Christian Kreibich and
               Jon Crowcroft},
  title     = {Efficient sequence alignment of network traffic},
  booktitle = {Proceedings of the 6th {ACM} {SIGCOMM} Internet Measurement Conference,
               {IMC} 2006, Rio de Janeriro, Brazil, October 25-27, 2006},
  pages     = {307--312},
  year      = {2006},
  crossref  = {DBLP:conf/imc/2006},
  url       = {https://doi.org/10.1145/1177080.1177121},
  doi       = {10.1145/1177080.1177121},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/KreibichC06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/MaLKSV06,
  author    = {Justin Ma and
               Kirill Levchenko and
               Christian Kreibich and
               Stefan Savage and
               Geoffrey M. Voelker},
  title     = {Unexpected means of protocol inference},
  booktitle = {Proceedings of the 6th {ACM} {SIGCOMM} Internet Measurement Conference,
               {IMC} 2006, Rio de Janeriro, Brazil, October 25-27, 2006},
  pages     = {313--326},
  year      = {2006},
  crossref  = {DBLP:conf/imc/2006},
  url       = {https://doi.org/10.1145/1177080.1177123},
  doi       = {10.1145/1177080.1177123},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/MaLKSV06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/DregerKPS05,
  author    = {Holger Dreger and
               Christian Kreibich and
               Vern Paxson and
               Robin Sommer},
  title     = {Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based
               Context},
  booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment,
               Second International Conference, {DIMVA} 2005, Vienna, Austria, July
               7-8, 2005, Proceedings},
  pages     = {206--221},
  year      = {2005},
  crossref  = {DBLP:conf/dimva/2005},
  url       = {https://doi.org/10.1007/11506881\_13},
  doi       = {10.1007/11506881\_13},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dimva/DregerKPS05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/KreibichS05,
  author    = {Christian Kreibich and
               Robin Sommer},
  title     = {Policy-Controlled Event Management for Distributed Intrusion Detection},
  booktitle = {25th International Conference on Distributed Computing Systems Workshops
               {(ICDCS} 2005 Workshops), 6-10 June 2005, Columbus, OH, {USA}},
  pages     = {385--391},
  year      = {2005},
  crossref  = {DBLP:conf/icdcsw/2005},
  url       = {https://doi.org/10.1109/ICDCSW.2005.112},
  doi       = {10.1109/ICDCSW.2005.112},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icdcsw/KreibichS05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/Kreibich05,
  author    = {Christian Kreibich},
  title     = {Brooery: {A} Graphical Environment for Analysis of Security-Relevant
               Network Activity},
  booktitle = {Proceedings of the {FREENIX} Track: 2005 {USENIX} Annual Technical
               Conference, April 10-15, 2005, Anaheim, CA, {USA}},
  pages     = {109--118},
  year      = {2005},
  crossref  = {DBLP:conf/usenix/2005f},
  url       = {http://www.usenix.org/events/usenix05/tech/freenix/kreibich.html},
  timestamp = {Mon, 07 May 2007 12:58:19 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/usenix/Kreibich05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/KreibichC04,
  author    = {Christian Kreibich and
               Jon Crowcroft},
  title     = {Honeycomb: creating intrusion detection signatures using honeypots},
  journal   = {Computer Communication Review},
  volume    = {34},
  number    = {1},
  pages     = {51--56},
  year      = {2004},
  url       = {https://doi.org/10.1145/972374.972384},
  doi       = {10.1145/972374.972384},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ccr/KreibichC04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/Kreibich04,
  author    = {Christian Kreibich},
  title     = {Design and Implementation of Netdude, a Framework for Packet Trace
               Manipulation (Awarded Best Student Paper!)},
  booktitle = {Proceedings of the {FREENIX} Track: 2004 {USENIX} Annual Technical
               Conference, June 27 - July 2, 2004, Boston Marriott Copley Place,
               Boston, MA, {USA}},
  pages     = {63--72},
  year      = {2004},
  crossref  = {DBLP:conf/usenix/2004f},
  url       = {http://www.usenix.org/publications/library/proceedings/usenix04/tech/freenix/kreibich.html},
  timestamp = {Thu, 11 Nov 2004 12:52:08 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/usenix/Kreibich04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HandleyPK01,
  author    = {Mark Handley and
               Vern Paxson and
               Christian Kreibich},
  title     = {Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End
               Protocol Semantics},
  booktitle = {10th {USENIX} Security Symposium, August 13-17, 2001, Washington,
               D.C., {USA}},
  year      = {2001},
  crossref  = {DBLP:conf/uss/2001},
  url       = {http://www.usenix.org/publications/library/proceedings/sec01/handley.html},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/HandleyPK01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2018,
  title     = {25th Annual Network and Distributed System Security Symposium, {NDSS}
               2018, San Diego, California, USA, February 18-21, 2018},
  publisher = {The Internet Society},
  year      = {2018},
  url       = {https://www.ndss-symposium.org/ndss2018/},
  timestamp = {Thu, 09 Aug 2018 10:56:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hotnets/2017,
  editor    = {Sujata Banerjee and
               Brad Karp and
               Michael Walfish},
  title     = {Proceedings of the 16th {ACM} Workshop on Hot Topics in Networks,
               Palo Alto, CA, USA, HotNets 2017, November 30 - December 01, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3152434},
  doi       = {10.1145/3152434},
  isbn      = {978-1-4503-5569-8},
  timestamp = {Tue, 06 Nov 2018 16:58:14 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/hotnets/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2016,
  editor    = {Stephen Schwab and
               William K. Robertson and
               Davide Balzarotti},
  title     = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
               {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2991079},
  doi       = {10.1145/2991079},
  isbn      = {978-1-4503-4771-6},
  timestamp = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imc/2016,
  editor    = {Phillipa Gill and
               John S. Heidemann and
               John W. Byers and
               Ramesh Govindan},
  title     = {Proceedings of the 2016 {ACM} on Internet Measurement Conference,
               {IMC} 2016, Santa Monica, CA, USA, November 14-16, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2987443},
  doi       = {10.1145/2987443},
  isbn      = {978-1-4503-4526-2},
  timestamp = {Tue, 06 Nov 2018 11:07:19 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobisys/2015,
  editor    = {Gaetano Borriello and
               Giovanni Pau and
               Marco Gruteser and
               Jason I. Hong},
  title     = {Proceedings of the 13th Annual International Conference on Mobile
               Systems, Applications, and Services, MobiSys 2015, Florence, Italy,
               May 19-22, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2742647},
  isbn      = {978-1-4503-3494-5},
  timestamp = {Thu, 22 Jun 2017 16:10:09 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mobisys/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigcomm/2015hotmiddlebox,
  editor    = {Theophilus Benson and
               Costin Raiciu},
  title     = {Proceedings of the 2015 {ACM} {SIGCOMM} Workshop on Hot Topics in
               Middleboxes and Network Function Virtualization, HotMiddlebox@SIGCOMM
               2015, London, United Kingdom, August 21, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {https://doi.org/10.1145/2785989},
  doi       = {10.1145/2785989},
  isbn      = {978-1-4503-3540-9},
  timestamp = {Tue, 06 Nov 2018 11:07:11 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigcomm/2015hotmiddlebox},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/conext/2014,
  editor    = {Aruna Seneviratne and
               Christophe Diot and
               Jim Kurose and
               Augustin Chaintreau and
               Luigi Rizzo},
  title     = {Proceedings of the 10th {ACM} International on Conference on emerging
               Networking Experiments and Technologies, CoNEXT 2014, Sydney, Australia,
               December 2-5, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2674005},
  isbn      = {978-1-4503-3279-8},
  timestamp = {Sat, 03 Jan 2015 15:23:47 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/conext/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pam/2014,
  editor    = {Michalis Faloutsos and
               Aleksandar Kuzmanovic},
  title     = {Passive and Active Measurement - 15th International Conference, {PAM}
               2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8362},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-04918-2},
  doi       = {10.1007/978-3-319-04918-2},
  isbn      = {978-3-319-04917-5},
  timestamp = {Tue, 23 May 2017 01:12:12 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pam/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imc/2013,
  editor    = {Konstantina Papagiannaki and
               P. Krishna Gummadi and
               Craig Partridge},
  title     = {Proceedings of the 2013 Internet Measurement Conference, {IMC} 2013,
               Barcelona, Spain, October 23-25, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2504730},
  isbn      = {978-1-4503-1953-9},
  timestamp = {Sat, 19 Aug 2017 20:08:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/imc/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2012,
  editor    = {Ting Yu and
               George Danezis and
               Virgil D. Gligor},
  title     = {the {ACM} Conference on Computer and Communications Security, CCS'12,
               Raleigh, NC, USA, October 16-18, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://dl.acm.org/citation.cfm?id=2382196},
  isbn      = {978-1-4503-1651-4},
  timestamp = {Tue, 16 Oct 2012 19:02:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imc/2012,
  editor    = {John W. Byers and
               Jim Kurose and
               Ratul Mahajan and
               Alex C. Snoeren},
  title     = {Proceedings of the 12th {ACM} {SIGCOMM} Internet Measurement Conference,
               {IMC} '12, Boston, MA, USA, November 14-16, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://dl.acm.org/citation.cfm?id=2398776},
  isbn      = {978-1-4503-1705-4},
  timestamp = {Sat, 19 Aug 2017 20:08:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/imc/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pam/2012,
  editor    = {Nina Taft and
               Fabio Ricciato},
  title     = {Passive and Active Measurement - 13th International Conference, {PAM}
               2012, Vienna, Austria, March 12-14th, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7192},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-28537-0},
  doi       = {10.1007/978-3-642-28537-0},
  isbn      = {978-3-642-28536-3},
  timestamp = {Tue, 23 May 2017 01:12:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pam/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2012,
  title     = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012,
               San Francisco, California, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2012},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6233637},
  isbn      = {978-0-7695-4681-0},
  timestamp = {Thu, 08 Jan 2015 16:59:42 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2012,
  editor    = {Tadayoshi Kohno},
  title     = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA,
               USA, August 8-10, 2012},
  publisher = {{USENIX} Association},
  year      = {2012},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dimva/2011,
  editor    = {Thorsten Holz and
               Herbert Bos},
  title     = {Detection of Intrusions and Malware, and Vulnerability Assessment
               - 8th International Conference; {DIMVA} 2011, Amsterdam, The Netherlands,
               July 7-8, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6739},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-22424-9},
  doi       = {10.1007/978-3-642-22424-9},
  isbn      = {978-3-642-22423-2},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dimva/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imc/2011,
  editor    = {Patrick Thiran and
               Walter Willinger},
  title     = {Proceedings of the 11th {ACM} {SIGCOMM} Internet Measurement Conference,
               {IMC} '11, Berlin, Germany, November 2-, 2011},
  publisher = {{ACM}},
  year      = {2011},
  url       = {http://dl.acm.org/citation.cfm?id=2068816},
  isbn      = {978-1-4503-1013-0},
  timestamp = {Sat, 19 Aug 2017 20:08:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/imc/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/leet/2011,
  editor    = {Christopher Kruegel},
  title     = {4th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
               {LEET} '11, Boston, MA, USA, March 29, 2011},
  publisher = {{USENIX} Association},
  year      = {2011},
  url       = {https://www.usenix.org/conference/leet11},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/leet/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigcomm/2011wmust,
  editor    = {Nina Taft and
               David Wetherall},
  title     = {Proceedings of the first {ACM} {SIGCOMM} workshop on Measurements
               up the stack, W-MUST@SIGCOMM 2011, Toronto, Ontario, Canada, August
               19, 2011},
  publisher = {{ACM}},
  year      = {2011},
  url       = {https://doi.org/10.1145/2018602},
  doi       = {10.1145/2018602},
  isbn      = {978-1-4503-0800-7},
  timestamp = {Tue, 06 Nov 2018 11:07:11 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigcomm/2011wmust},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2011,
  title     = {32nd {IEEE} Symposium on Security and Privacy, S{\&}P 2011, 22-25
               May 2011, Berkeley, California, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5955408},
  isbn      = {978-1-4577-0147-4},
  timestamp = {Thu, 08 Jan 2015 16:59:44 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2011,
  title     = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
               2011, Proceedings},
  publisher = {{USENIX} Association},
  year      = {2011},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2011foci,
  editor    = {Nick Feamster and
               Wenke Lee},
  title     = {{USENIX} Workshop on Free and Open Communications on the Internet,
               {FOCI} '11, San Francisco, CA, USA, August 8, 2011},
  publisher = {{USENIX} Association},
  year      = {2011},
  url       = {https://www.usenix.org/conference/foci11},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2011foci},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imc/2010,
  editor    = {Mark Allman},
  title     = {Proceedings of the 10th {ACM} {SIGCOMM} Internet Measurement Conference,
               {IMC} 2010, Melbourne, Australia - November 1-3, 2010},
  publisher = {{ACM}},
  year      = {2010},
  isbn      = {978-1-4503-0483-2},
  timestamp = {Sat, 19 Aug 2017 20:08:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/imc/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/leet/2010,
  editor    = {Michael Bailey},
  title     = {3rd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
               {LEET} '10, San Jose, CA, USA, April 27, 2010},
  publisher = {{USENIX} Association},
  year      = {2010},
  url       = {https://www.usenix.org/conference/leet10},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/leet/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2010,
  title     = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March
               2010},
  publisher = {The Internet Society},
  year      = {2010},
  url       = {http://www.isoc.org/isoc/conferences/ndss/10/},
  timestamp = {Wed, 31 Aug 2011 13:59:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2009,
  editor    = {Ehab Al{-}Shaer and
               Somesh Jha and
               Angelos D. Keromytis},
  title     = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
               Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  publisher = {{ACM}},
  year      = {2009},
  isbn      = {978-1-60558-894-0},
  timestamp = {Wed, 25 Nov 2009 10:26:38 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/leet/2009,
  editor    = {Wenke Lee},
  title     = {2nd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
               {LEET} '09, Boston, MA, USA, April 21, 2009},
  publisher = {{USENIX} Association},
  year      = {2009},
  url       = {https://www.usenix.org/conference/leet09},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/leet/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2008,
  editor    = {Peng Ning and
               Paul F. Syverson and
               Somesh Jha},
  title     = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
               Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  publisher = {{ACM}},
  year      = {2008},
  isbn      = {978-1-59593-810-7},
  timestamp = {Tue, 11 Nov 2008 10:39:24 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dimva/2008,
  editor    = {Diego Zamboni},
  title     = {Detection of Intrusions and Malware, and Vulnerability Assessment,
               5th International Conference, {DIMVA} 2008, Paris, France, July 10-11,
               2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5137},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-70542-0},
  doi       = {10.1007/978-3-540-70542-0},
  isbn      = {978-3-540-70541-3},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dimva/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nsdi/2008leet,
  editor    = {Fabian Monrose},
  title     = {First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
               {LEET} '08, San Francisco, CA, USA, April 15, 2008, Proceedings},
  publisher = {{USENIX} Association},
  year      = {2008},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nsdi/2008leet},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2008hotsec,
  editor    = {Niels Provos},
  title     = {3rd {USENIX} Workshop on Hot Topics in Security, HotSec'08, San Jose,
               CA, USA, July 29, 2008, Proceedings},
  publisher = {{USENIX} Association},
  year      = {2008},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2008hotsec},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2007hotsec,
  title     = {2nd {USENIX} Workshop on Hot Topics in Security, HotSec'07, Boston,
               MA, USA, August 7, 2007},
  publisher = {{USENIX} Association},
  year      = {2007},
  url       = {https://www.usenix.org/conference/hotsec07},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2007hotsec},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imc/2006,
  editor    = {Jussara M. Almeida and
               Virg{\'{\i}}lio A. F. Almeida and
               Paul Barford},
  title     = {Proceedings of the 6th {ACM} {SIGCOMM} Internet Measurement Conference,
               {IMC} 2006, Rio de Janeriro, Brazil, October 25-27, 2006},
  publisher = {{ACM}},
  year      = {2006},
  isbn      = {1-59593-561-4},
  timestamp = {Sat, 19 Aug 2017 20:08:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/imc/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dimva/2005,
  editor    = {Klaus Julisch and
               Christopher Kr{\"{u}}gel},
  title     = {Detection of Intrusions and Malware, and Vulnerability Assessment,
               Second International Conference, {DIMVA} 2005, Vienna, Austria, July
               7-8, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3548},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/b137798},
  doi       = {10.1007/b137798},
  isbn      = {3-540-26613-5},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dimva/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdcsw/2005,
  title     = {25th International Conference on Distributed Computing Systems Workshops
               {(ICDCS} 2005 Workshops), 6-10 June 2005, Columbus, OH, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2005},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9817},
  isbn      = {0-7695-2328-5},
  timestamp = {Thu, 11 Dec 2014 17:34:09 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icdcsw/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/usenix/2005f,
  title     = {Proceedings of the {FREENIX} Track: 2005 {USENIX} Annual Technical
               Conference, April 10-15, 2005, Anaheim, CA, {USA}},
  publisher = {{USENIX}},
  year      = {2005},
  timestamp = {Mon, 07 May 2007 12:58:19 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/usenix/2005f},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/usenix/2004f,
  title     = {Proceedings of the {FREENIX} Track: 2004 {USENIX} Annual Technical
               Conference, June 27 - July 2, 2004, Boston Marriott Copley Place,
               Boston, MA, {USA}},
  publisher = {{USENIX}},
  year      = {2004},
  timestamp = {Thu, 11 Nov 2004 12:52:08 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/usenix/2004f},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2001,
  editor    = {Dan S. Wallach},
  title     = {10th {USENIX} Security Symposium, August 13-17, 2001, Washington,
               D.C., {USA}},
  publisher = {{USENIX}},
  year      = {2001},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI, founded at University of Trier