Tag(s): S » Security  ⇒  Show Papers
next Tag#Papers #TagsPaper
Boot17Lest We Remember: Cold Boot Attacks on Encryption Keys
Botnet423 
breach19Do Data Breach Disclosure Laws Reduce Identity Theft?
China17Studying Malicious Websites and the Underground Economy on the Chinese Web
Cold17Lest We Remember: Cold Boot Attacks on Encryption Keys
Data19Do Data Breach Disclosure Laws Reduce Identity Theft?
Diplomarbeit15Eine Infrastruktur zur Einschätzung des aktuellen Gefährdungslevels durch Malware
disclosure19Do Data Breach Disclosure Laws Reduce Identity Theft?
DNS212 
DRAM17Lest We Remember: Cold Boot Attacks on Encryption Keys
E-crime28 
economics19Do Data Breach Disclosure Laws Reduce Identity Theft?
Economy211 
Encryption17Lest We Remember: Cold Boot Attacks on Encryption Keys
ENISA15Botnets - The Silent Threat
fast-flux420 
fixed-effects19Do Data Breach Disclosure Laws Reduce Identity Theft?
honeyblog1577 
Honeynet13Know Your Enemy: Malicious Web Servers
Honeypot312 
ICANN17SAC 025: SSAC Advisory on Fast Flux Hosting and DNS
identity19Do Data Breach Disclosure Laws Reduce Identity Theft?
information19Do Data Breach Disclosure Laws Reduce Identity Theft?
Internet414 
IRC15Characterizing the IRC-based Botnet Phenomenon
Key17Lest We Remember: Cold Boot Attacks on Encryption Keys
Malware1572 
Markets14An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants
Measurement14An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants
network14Know Your Enemy: Fast-Flux Service Networks
OECD16Malicious Software (Malware): A Security Threat to the Internet Economy
RAM17Lest We Remember: Cold Boot Attacks on Encryption Keys
regression19Do Data Breach Disclosure Laws Reduce Identity Theft?
Spam420 
SSAC17SAC 025: SSAC Advisory on Fast Flux Hosting and DNS
stock13The Effect of Stock Spam on Financial Markets - WORKING PAPER
Storm17Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm
theft19Do Data Breach Disclosure Laws Reduce Identity Theft?
Trojan1159 
Underground211 
USENIX17Lest We Remember: Cold Boot Attacks on Encryption Keys
Virus1159 
Webserver13Know Your Enemy: Malicious Web Servers
website17Studying Malicious Websites and the Underground Economy on the Chinese Web
Worm17Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm