27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Evan Dembskey and Elmarie Biermann<br />

Chen, K., Jiang, J., Huang, P., Chu, H., Lei, C. & Chen, W. 2009. Identifying MMORPG Bots: A Traffic Analysis<br />

Approach. EURASIP Journal on Advances in signal Processing. Volume 2009, Article 3.<br />

Chiang, K. & Lloyd, L. 2007. A Case Study of the Rustock Rootkit and Spam Bot. Proceedings of the First<br />

Workshop on Hot Topics in Understanding Botnets, Cambridge, MA.<br />

Cruz, M. 2008, , Most Abused Infection Vector. Available: http://blog.trendmicro.com/most-abused-infectionvector/<br />

[2010, 9/27/2010].<br />

Damballa Inc. 2009. Upate on the Enemy: A deconstruction of who profits from botnets. Available:<br />

http://www.damballa.com/downloads/d_pubs/WP%20Update%20on%20the%20Enemy%20(2009-05-<br />

13).pdf<br />

Dembskey, E. & Biermann, E. 2008, "Software agent framework for computer network operations in IW",<br />

Proceedings of the 3rd International <strong>Conference</strong> On Information Warfare And Security, ed. L. Armistead,<br />

ACL, pp. 127.<br />

Denning, P.J. & Denning, D.E. 2010, "Discussing cyber attack", Commun.ACM, vol. 53, no. 9, pp. 29-31.<br />

Dunham, K. & Melnick, J. 2009, Malicious Bots: An Inside Look Into the Cyber-Criminal Underground of the<br />

Internet, Auerbach Publications.<br />

Jansen van Vuuren, J., Phahlamohlaka, J. & Brazzoli, M. 2010, "The Impact of the Increase in Broadband<br />

Access on South African National Security and the Average citizen", Proceedings of the 5th International<br />

<strong>Conference</strong> on Information Warfare and Security, ed. L. Armistead, ACL , pp. 171.<br />

Knapp, K.J. & Boulton, W.R. 2008, "Ten Information Warfare Trends" in Cyber Warfare and Cyber Terrorism,<br />

eds. Kenneth Knapp & William Boulton, IGI Global, US; Hershey, PA, pp. 17-25.<br />

Li, Z., Liao, Q & Striegel, A. 2008. Botnet Economics: Uncertainty Matters. Workshop on the Economics of<br />

Information Security (WEIS 2008), London, England.<br />

Li, Z., Goyal, A., Chen, Y. & Paxson, V. 2009. Automating Analysis of Large-Scale Botnet Probing Events.<br />

Proceedings of the 4 th International Symposium on Information, Computer and Communications Security.<br />

Sydney, Australia.<br />

Liu, J. 2001, Autonomous agents and multi-agent systems: explorations in learning, self-organization, and<br />

adaptive computation, World Scientific.<br />

Liu, J., Xiao, Y., Ghaboosi, K., Deng, H. & Zhang, J. 2009. Botnet: Classification, Attacks, Detection, Tracing and<br />

Preventive measures. EURASIP Journal on Wireless Communications and Networking, Volume 2009.<br />

Hindawi Publishing Corporation.<br />

Lu, W. Tavallaee, M. & Ghorbani, AA. 2009. Automatic Discovery of Botnet Communities on Large-Scale<br />

Communication Networks. Proceedings of the 4 th International Symposium on Information, Computer and<br />

Communications Security. Sydney, Australia.<br />

Masud, MM., Gao, J., Khan, L., Han, J. & Thuraisingham, B. 2008. Peer to Peer Botnet Detection for Cyber-<br />

Security: A Data Mining Approach. In: Proceedings of the 4 th annual workshop on Cyber security and<br />

information intelligence research: developing strategies to meet the cyber security and information<br />

intelligence challenges ahead. Oak ridge, Tennessee.<br />

Microsoft, 2010. Download details: Microsoft Security Intelligence Report volume 8 (July - December 2009).<br />

Available: http://www.microsoft.com/downloads/details.aspx?FamilyID=2c4938a0-4d64-4c65-b951-<br />

754f4d1af0b5&displaylang=en [7/21/2010].<br />

Murch, R. & Johnson, T. 1999, Intelligent software agents, prentice Hall PTR.<br />

National Research Council (U.S.). Committee on the Role of Information Technology in Responding to Terrorism,<br />

Hennessy, J.L., Patterson, D.A., Lin, H. & National Academies Press 2003, Information technology for<br />

counterterrorism: immediate actions and future possibilities, National Academies Press, Washington, D.C.<br />

OECD (Organization for Economic Co-operation and Development). 2007. Malicious Software (Malware): A<br />

Security Threat to the Internet Community. Ministerial Background Report [Online]. Available:<br />

http://www.oecd.org/dataoecd/53/34/40724457.pdf<br />

Ollmann, G. 2010, "Asymmetrical Warfare: Challenges and Strategies for Countering Botnets", The 5th<br />

International <strong>Conference</strong> on Information-Warfare & SecurityACI, Reading, England, pp. 507.<br />

Oram, A. & Viega, J. 2009, Beautiful security, 1st edn, O'Reilly, Sebastopol, CA.<br />

Padgham, L. & Winikoff, M. 2004, Developing intelligent agent systems: a practical guide, Wiley.<br />

Pathak, A., Qian, F., Hu, Y.C., Mao, ZM. & Ranjan, S. 2009. Botnet Spam Campaigns Can Be Long Lasting:<br />

Evidence, Implications, and Analysis. Proceedings of the 11 th International Joint <strong>Conference</strong> on<br />

Measurement and Modeling of Computer Systems. SIGMETRICS / Performance'09, June 15-19, 2009,<br />

Seattle, WA.<br />

Porras, P. 2009. Reflections on Conficker: An insider's view of the analysis and implications of the Conficker<br />

conundrum. CACM 52 (10). October.<br />

Prince, B. 2010,, Russian Cybercrime: Geeks, Not Gangsters | eWEEK Europe UK. Available:<br />

http://www.eweekeurope.co.uk/knowledge/russian-cybercrime-geeks-not-gangsters-9182/2 [2010,<br />

8/30/2010].<br />

Ramachandran, A. & Feamster, N. 2006. Understanding the Network Level Behavior of Spammers. Proceedings<br />

of the 2006 <strong>Conference</strong> on Applications, Technologies, Architectures and Protocols for Computer<br />

Communications, SIGCOMM’06, September 11-15, 2006, Pisa, Italy.<br />

Schiller, C.A., Binkley, J. & Harley, D. 2007, Botnets: the killer web app, Syngress Media Inc.<br />

Smith, G. 1998,, Issues in S and T, Fall 1998, An Electronic Pearl Harbor? Not Likely. Available:<br />

http://www.issues.org/15.1/smith.htm [2010, 8/16/2010].<br />

305

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!