1. Privacy-Preserving Sharing of Sensitive Information is (Really) PracticalEmiliano De Cristofaro, Yanbin Lu, Gene TsudikUniversity of California, IrvineAbstract The need…
1. Full Paper ACEEE Int. J. on Network Security , Vol. 5, No. 1, January 2014Genetic Algorithm based Layered Detection and Defense of HTTP Botnet Seena Elizebeth Mathew1,…
1. Yan Chen Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University http://list.cs.northwestern.edu Intrusion…
Slide 1 BOTNET: CLASSIFICATION, ATTACKS, DETECTION, TRACING, AND PREVENTIVE MEASURES SHAU-EN CHOU WIRELESS AND BROADBAND NETWORKS LABORATORY DEPARTMENT OF CSIE NATIONAL TAIPEI…
Detecting Covert Timing Channels with Time-deterministic Repplay PRISM: Private Retrieval of the Internet’s Sensitive Metadata Ang Chen Andreas Haeberlen University of…
CLUSTERING SPAM DOMAINS AND HOSTS: ANTI-SPAM FORENSICS WITH DATA MINING by CHUN WEI ALAN P. SPRAGUE, COMMITTEE CHAIR ANTHONY SKJELLUM CHENGCUI ZHANG KENT R. KERLEY RANDAL…