11.07.2015 Views

syssec_red_book

syssec_red_book

syssec_red_book

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Bibliography[407] W. Yang, N. Li, Y. Qi, W. Qardaji, S. McLaughlin, and P. McDaniel. Minimizing privatedata disclosures in the smart grid. In ACM conference on Computer and CommunicationsSecurity. ACM Request Permissions, Oct. 2012.[408] Z. Yang, C. Wilson, X. Wang, T. Gao, B. Y. Zhao, and Y. Dai. Uncovering social networksybils in the wild. Proceedings of the 2011 ACM SIGCOMM conference on Internet measurementconference - IMC ’11, page 259, 2011.[409] T.-F. Yen and M. K. Reiter. Revisiting Botnet Models and Their Implications for TakedownStrategies. In Proceedings of the 1st Conference on Principles of Security and Trust, 2012.[410] H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao. SybilLimit: A Near-Optimal SocialNetwork Defense against Sybil Attacks. In 2008 IEEE Symposium on Security and Privacy (sp2008), number Figure 1, pages 3–17. IEEE, May 2008.[411] H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. SybilGuard: Defending Against SybilAttacks via Social Networks. In Proceedings of the 2006 conference on Applications, technologies,architectures, and protocols for computer communications - SIGCOMM ’06, number September,pages 267–278, New York, New York, USA, 2006. ACM Press.[412] S. Zanero and Z. Simic. Emergent phenomena testbed simulator for improving SCADAperformance in power system security management. Technical report, 2013.[413] C. Zheng, S. Zhu, S. Dai, G. Gu, X. Gong, X. Han, and W. Zou. SmartDroid: an automaticsystem for revealing UI-based trigger conditions in Android applications. In Proc. of SPSM,2012.[414] W. Zhou, Y. Zhou, X. Jiang, and P. Ning. Detecting repackaged smartphone applications inthird-party android marketplaces. In Proceedings of the second ACM conference on Data andApplication Security and Privacy (CODASPY), 2012.[415] Y. Zhou and X. Jiang. Android Malware Genome Project. http://www.malgenomeproject.org/.[416] Y. Zhou and X. Jiang. Dissecting android malware: Characterization and evolution. InProc. of the IEEE Symposium on Security and Privacy, 2012.[417] Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, you, get off of my market: Detectingmalicious apps in official and alternative Android markets. In Proceedings of the 19th AnnualNetwork & Distributed System Security Symposium, Feb. 2012.[418] T. Zimmermann, N. Nagappan, and L. Williams. Searching for a Needle in a Haystack:P<strong>red</strong>icting Security Vulnerabilities for Windows Vista. In Proc. of the 3rd InternationalConference on Software Testing, Verification and Validation, ICST’10, Apr. 2010.[419] M. Zuckerberg. Face<strong>book</strong> across the web. http://www.face<strong>book</strong>.com/blog/blog.php?post=41735647130.185

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!