Title&col=t">↑&col=t">↓Author&col=a">↑&col=a">↓Type&col=pt">↑&col=pt">↓Year&col=y">↑&col=y">↓LangSize&col=s">↑&col=s">↓linkCommentSourceUpload&col=u">↑&col=u">↓Tags
The Impact of Incentives on Notice and Take-downTyler Moore, Richard Claytonpdf2008en352.14 KMooreImpact.pdffound on http://honeyblog.orghttp://weis2008.econinfosec.org/...2009-06-21Security fast-flux Spam Malware Virus Trojan
Malicious Software (Malware): A Security Threat to the Internet EconomyOECDpdf2008en1.69 MB40724457.pdfMinisterial Background Report DSTI/ICCP/REG(2007)5/FINALhttp://www.oecd.org/dataoecd/53/...2009-06-21Security Spam Malware Virus Trojan Botnet OECD honeyblog
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm WormThorsten Holz, Moritz Steiner, Frederic Dahl, Ernst Biersack, Felix Freilingpdf2008en592.29 Kstorm-leet08.pdffound on http://honeyblog.orghttp://honeyblog.org/junkyard/pa...2009-06-21Security Spam Malware Virus Trojan Botnet Storm Worm honeyblog
SAC 025: SSAC Advisory on Fast Flux Hosting and DNSICANNpdf2008en169.22 Ksac025.pdffound on http://honeyblog.orghttp://www.icann.org/en/committe...2009-06-21Security fast-flux Malware Virus Trojan honeyblog DNS ICANN SSAC
Studying Malicious Websites and the Underground Economy on the Chinese WebJianwei Zhuge, Thorsten Holz, Chengyu Song, Jinpeng Guo, Xinhui Han, Wei Zoupdf2008en476.21 Kwww-china-WEIS08.pdffound on http://honeyblog.orghttp://honeyblog.org/junkyard/pa...2009-06-21Security Malware Virus Trojan honeyblog website Underground Economy China
Measuring and Detecting Fast-Flux Service NetworksThorsten Holz, Christian Gorecki, Konrad Rieck, Felix C. Freilingpdf2008en451.84 Kfast-flux-ndss08.pdffound on http://honeyblog.orghttps://pi1.informatik.uni-mannheim.de/filepool/research/publications/fast-flux-ndss08.pdf2009-06-21Security fast-flux Malware Virus Trojan honeyblog DNS
Security Economics and The Internal MarketRoss Anderson, Rainer Böhme, Richard Clayton, Tyler Moorepdf2009en1.61 MBreport_sec_econ_&_int_mar...found on http://honeyblog.orghttp://www.enisa.europa.eu/doc/p...2009-06-21Security Malware Virus Trojan honeyblog Economy
Collecting Autonomous Spreading Malware Using High-Interaction HoneypotsJianwei Zhuge, Thorsten Holz, Xinhui Han, Chengyu Song, Wei Zoupdf2008en649.17 Khoneybow-ICICS07.pdffound on http://honeyblog.orghttp://honeyblog.org/junkyard/pa...2009-06-21Security Malware Virus Trojan honeyblog Honeypot
Characterizing the IRC-based Botnet PhenomenonJianwei Zhuge, Thorsten Holz, Xinhui Han, Jinpeng Guo, Wei Zoupdf2007en329.52 Kbotnet-china-TR.pdffound on http://honeyblog.orghttp://honeyblog.org/junkyard/re...2009-06-21Security Malware Virus Trojan Botnet honeyblog IRC
Botnets - The Silent ThreatDavid Barrosopdf2007en413.57 Kenisa_pp_botnets.pdffound on http://honeyblog.orghttp://www.enisa.europa.eu/doc/p...2009-06-21Security Malware Virus Trojan Botnet honeyblog ENISA
Eine Infrastruktur zur Einschätzung des aktuellen Gefährdungslevels durch MalwareLaura Anna Itzelpdf2007de2.06 MBdiplomarbeit-2007-itzel.p...ound on http://honeyblog.orghttp://pi1.informatik.uni-mannhe...2009-06-21Security Malware Virus Trojan honeyblog Honeypot Diplomarbeit