6th European Conference - Academic Conferences
6th European Conference - Academic Conferences
6th European Conference - Academic Conferences
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Evan Dembskey and Elmarie Biermann<br />
Chen, K., Jiang, J., Huang, P., Chu, H., Lei, C. & Chen, W. 2009. Identifying MMORPG Bots: A Traffic Analysis<br />
Approach. EURASIP Journal on Advances in signal Processing. Volume 2009, Article 3.<br />
Chiang, K. & Lloyd, L. 2007. A Case Study of the Rustock Rootkit and Spam Bot. Proceedings of the First<br />
Workshop on Hot Topics in Understanding Botnets, Cambridge, MA.<br />
Cruz, M. 2008, , Most Abused Infection Vector. Available: http://blog.trendmicro.com/most-abused-infectionvector/<br />
[2010, 9/27/2010].<br />
Damballa Inc. 2009. Upate on the Enemy: A deconstruction of who profits from botnets. Available:<br />
http://www.damballa.com/downloads/d_pubs/WP%20Update%20on%20the%20Enemy%20(2009-05-<br />
13).pdf<br />
Dembskey, E. & Biermann, E. 2008, "Software agent framework for computer network operations in IW",<br />
Proceedings of the 3rd International <strong>Conference</strong> On Information Warfare And Security, ed. L. Armistead,<br />
ACL, pp. 127.<br />
Denning, P.J. & Denning, D.E. 2010, "Discussing cyber attack", Commun.ACM, vol. 53, no. 9, pp. 29-31.<br />
Dunham, K. & Melnick, J. 2009, Malicious Bots: An Inside Look Into the Cyber-Criminal Underground of the<br />
Internet, Auerbach Publications.<br />
Jansen van Vuuren, J., Phahlamohlaka, J. & Brazzoli, M. 2010, "The Impact of the Increase in Broadband<br />
Access on South African National Security and the Average citizen", Proceedings of the 5th International<br />
<strong>Conference</strong> on Information Warfare and Security, ed. L. Armistead, ACL , pp. 171.<br />
Knapp, K.J. & Boulton, W.R. 2008, "Ten Information Warfare Trends" in Cyber Warfare and Cyber Terrorism,<br />
eds. Kenneth Knapp & William Boulton, IGI Global, US; Hershey, PA, pp. 17-25.<br />
Li, Z., Liao, Q & Striegel, A. 2008. Botnet Economics: Uncertainty Matters. Workshop on the Economics of<br />
Information Security (WEIS 2008), London, England.<br />
Li, Z., Goyal, A., Chen, Y. & Paxson, V. 2009. Automating Analysis of Large-Scale Botnet Probing Events.<br />
Proceedings of the 4 th International Symposium on Information, Computer and Communications Security.<br />
Sydney, Australia.<br />
Liu, J. 2001, Autonomous agents and multi-agent systems: explorations in learning, self-organization, and<br />
adaptive computation, World Scientific.<br />
Liu, J., Xiao, Y., Ghaboosi, K., Deng, H. & Zhang, J. 2009. Botnet: Classification, Attacks, Detection, Tracing and<br />
Preventive measures. EURASIP Journal on Wireless Communications and Networking, Volume 2009.<br />
Hindawi Publishing Corporation.<br />
Lu, W. Tavallaee, M. & Ghorbani, AA. 2009. Automatic Discovery of Botnet Communities on Large-Scale<br />
Communication Networks. Proceedings of the 4 th International Symposium on Information, Computer and<br />
Communications Security. Sydney, Australia.<br />
Masud, MM., Gao, J., Khan, L., Han, J. & Thuraisingham, B. 2008. Peer to Peer Botnet Detection for Cyber-<br />
Security: A Data Mining Approach. In: Proceedings of the 4 th annual workshop on Cyber security and<br />
information intelligence research: developing strategies to meet the cyber security and information<br />
intelligence challenges ahead. Oak ridge, Tennessee.<br />
Microsoft, 2010. Download details: Microsoft Security Intelligence Report volume 8 (July - December 2009).<br />
Available: http://www.microsoft.com/downloads/details.aspx?FamilyID=2c4938a0-4d64-4c65-b951-<br />
754f4d1af0b5&displaylang=en [7/21/2010].<br />
Murch, R. & Johnson, T. 1999, Intelligent software agents, prentice Hall PTR.<br />
National Research Council (U.S.). Committee on the Role of Information Technology in Responding to Terrorism,<br />
Hennessy, J.L., Patterson, D.A., Lin, H. & National Academies Press 2003, Information technology for<br />
counterterrorism: immediate actions and future possibilities, National Academies Press, Washington, D.C.<br />
OECD (Organization for Economic Co-operation and Development). 2007. Malicious Software (Malware): A<br />
Security Threat to the Internet Community. Ministerial Background Report [Online]. Available:<br />
http://www.oecd.org/dataoecd/53/34/40724457.pdf<br />
Ollmann, G. 2010, "Asymmetrical Warfare: Challenges and Strategies for Countering Botnets", The 5th<br />
International <strong>Conference</strong> on Information-Warfare & SecurityACI, Reading, England, pp. 507.<br />
Oram, A. & Viega, J. 2009, Beautiful security, 1st edn, O'Reilly, Sebastopol, CA.<br />
Padgham, L. & Winikoff, M. 2004, Developing intelligent agent systems: a practical guide, Wiley.<br />
Pathak, A., Qian, F., Hu, Y.C., Mao, ZM. & Ranjan, S. 2009. Botnet Spam Campaigns Can Be Long Lasting:<br />
Evidence, Implications, and Analysis. Proceedings of the 11 th International Joint <strong>Conference</strong> on<br />
Measurement and Modeling of Computer Systems. SIGMETRICS / Performance'09, June 15-19, 2009,<br />
Seattle, WA.<br />
Porras, P. 2009. Reflections on Conficker: An insider's view of the analysis and implications of the Conficker<br />
conundrum. CACM 52 (10). October.<br />
Prince, B. 2010,, Russian Cybercrime: Geeks, Not Gangsters | eWEEK Europe UK. Available:<br />
http://www.eweekeurope.co.uk/knowledge/russian-cybercrime-geeks-not-gangsters-9182/2 [2010,<br />
8/30/2010].<br />
Ramachandran, A. & Feamster, N. 2006. Understanding the Network Level Behavior of Spammers. Proceedings<br />
of the 2006 <strong>Conference</strong> on Applications, Technologies, Architectures and Protocols for Computer<br />
Communications, SIGCOMM’06, September 11-15, 2006, Pisa, Italy.<br />
Schiller, C.A., Binkley, J. & Harley, D. 2007, Botnets: the killer web app, Syngress Media Inc.<br />
Smith, G. 1998,, Issues in S and T, Fall 1998, An Electronic Pearl Harbor? Not Likely. Available:<br />
http://www.issues.org/15.1/smith.htm [2010, 8/16/2010].<br />
305