Brett Stone-Gross

According to our database1, Brett Stone-Gross authored at least 15 papers between 2007 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Two years of short URLs internet measurement: security threats and countermeasures.
Proceedings of the 22nd International World Wide Web Conference, 2013

SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Highly resilient peer-to-peer botnets are here: An analysis of Gameover Zeus.
Proceedings of the 8th International Conference on Malicious and Unwanted Software: "The Americas", 2013

2011
Analysis of a Botnet Takeover.
IEEE Secur. Priv., 2011

The Underground Economy of Fake Antivirus Software.
Proceedings of the Economics of Information Security and Privacy III [papers from the Tenth Workshop on Economics and Information Security, 2011

The Underground Economy of Fake Antivirus Software.
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011

BOTMAGNIFIER: Locating Spambots on the Internet.
Proceedings of the 20th USENIX Security Symposium, 2011

The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

Peering through the iframe.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Understanding fraudulent activities in online ad exchanges.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011

2009
Your botnet is my botnet: analysis of a botnet takeover.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

FIRE: FInding Rogue nEtworks.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Malware in IEEE 802.11 Wireless Networks.
Proceedings of the Passive and Active Network Measurement, 9th International Conference, 2008

VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges.
Proceedings of the Detection of Intrusions and Malware, 2008

2007
MIST: Cellular data network measurement for mobile applications.
Proceedings of the Fourth International Conference on Broadband Communications, 2007


  Loading...