Login / Signup
EC2ND
2011
2011
2011
Keyphrases
Publications
2011
Guido Schwenk
,
Konrad Rieck
Adaptive Detection of Covert Communication in HTTP Requests.
EC2ND
(2011)
Dina Hadziosmanovic
,
Damiano Bolzoni
,
Pieter H. Hartel
,
Sandro Etalle
MELISSA: Towards Automated Detection of Undesirable User Actions in Critical Infrastructures.
EC2ND
(2011)
Seventh European Conference on Computer Network Defense, EC2ND 2011, Gothenburg, Sweden, September 6-7, 2011
EC2ND
(2011)
Magnus Almgren
,
Marina Papatriantafilou
Discussion Panel in conjunction with the 7th European Conference on Computer Network Defense (EC2ND 2011): Security Issues in the Smart Grid.
EC2ND
(2011)
Eleni Gessiou
,
Quang Hieu Vu
,
Sotiris Ioannidis
IRILD: An Information Retrieval Based Method for Information Leak Detection.
EC2ND
(2011)
Georgios Kontaxis
,
Iasonas Polakis
,
Michalis Polychronakis
,
Evangelos P. Markatos
dead.drop: URL-Based Stealthy Messaging.
EC2ND
(2011)
Christian J. Dietrich
,
Christian Rossow
,
Felix C. Freiling
,
Herbert Bos
,
Maarten van Steen
,
Norbert Pohlmann
On Botnets That Use DNS for Command and Control.
EC2ND
(2011)
Zhang Fu
Mitigating Distributed Denial-of-Service Attacks: Application-Defense and Network-Defense Methods.
EC2ND
(2011)
Farnaz Moradi
,
Tomas Olovsson
,
Philippas Tsigas
The Anti-Social Behavior of Spam.
EC2ND
(2011)
Andreas Larsson
,
Philippas Tsigas
Security in Wireless Sensor Networks.
EC2ND
(2011)
Benjamin Greschbach
Location Privacy: User-Centric Threat Analysis.
EC2ND
(2011)
Iasonas Polakis
,
Georgios Kontaxis
,
Sotiris Ioannidis
CAPTCHuring Automated (Smart)Phone Attacks.
EC2ND
(2011)
Hayawardh Vijayakumar
,
Joshua Schiffman
,
Trent Jaeger
A Rose by Any Other Name or an Insane Root? Adventures in Name Resolution.
EC2ND
(2011)
Mihai Costache
,
Valentin Tudor
,
Magnus Almgren
,
Marina Papatriantafilou
,
Christopher Saunders
Remote Control of Smart Meters: Friend or Foe?
EC2ND
(2011)