599
edits
(→Topics) |
|||
Line 54: | Line 54: | ||
| [http://www.blackhat.com/presentations/bh-dc-10/Stevens_Kevin/BlackHat-DC-2010-Stevens-Underground-wp.pdf] [http://weis2011.econinfosec.org/papers/The%20Underground%20Economy%20of%20Fake%20Antivirus%20Software.pdf] [http://www.cs.ucsb.edu/~vigna/publications/2011_stone_cova_gilbert_kemmerer_kruegel_vigna_torpig.pdf] | | [http://www.blackhat.com/presentations/bh-dc-10/Stevens_Kevin/BlackHat-DC-2010-Stevens-Underground-wp.pdf] [http://weis2011.econinfosec.org/papers/The%20Underground%20Economy%20of%20Fake%20Antivirus%20Software.pdf] [http://www.cs.ucsb.edu/~vigna/publications/2011_stone_cova_gilbert_kemmerer_kruegel_vigna_torpig.pdf] | ||
|- | |- | ||
| <strike>Malware Detection in Networks - Anomaly Detection</strike> (assigned to Abouzar) | | <strike>Malware Detection in Networks - Anomaly Detection</strike> (assigned to Abouzar Hosseini) | ||
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler] | | [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler] | ||
| [http://www.google.com/url?sa=t&rct=j&q=malware%20detection%20in%20networks&source=web&cd=1&ved=0CB4QFjAA&url=http%3A%2F%2Fwww.networkworld.com%2Fnews%2F2007%2F042507-malware-detection.html&ei=Rm2lTpTFHcrNswaijp2eAw&usg=AFQjCNG5qvZm7a4kS-L8ajgOmMNEVoDQZA&cad=rja] | | [http://www.google.com/url?sa=t&rct=j&q=malware%20detection%20in%20networks&source=web&cd=1&ved=0CB4QFjAA&url=http%3A%2F%2Fwww.networkworld.com%2Fnews%2F2007%2F042507-malware-detection.html&ei=Rm2lTpTFHcrNswaijp2eAw&usg=AFQjCNG5qvZm7a4kS-L8ajgOmMNEVoDQZA&cad=rja] |
edits