18.11.2014 Views

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Guerrero, C. D. and Labrador, M. A. (2010). On the applicability of available bandwidth<br />

estimation techniques and tools. Comput. Commun., 33:11–22.<br />

Jain, R. (2008). The Art Of Computer Systems Performance Analysis:Techniques for<br />

Experimental Design, Measurement, Simulation, and Mo<strong>de</strong>ling. Wiley India Pvt. Ltd.<br />

John, J. P., Moshchuk, A., Gribble, S. D., and Krishnamurthy, A. (2009). Studying spamming<br />

botnets using botlab. In NSDI’09: Proceedings of the 6th USENIX symposium on<br />

Networked systems <strong>de</strong>sign and implementation, pages 291–306, Berkeley, CA, USA.<br />

USENIX Association.<br />

Kreibich, C., Kanich, C., Levchenko, K., Enright, B., Voelker, G. M., Paxson, V., and<br />

Savage, S. (2008). On the spam campaign trail. In LEET’08: Proceedings of the 1st<br />

Usenix Workshop on Large-Scale Exploits and Emergent Threats, pages 1–9, Berkeley,<br />

CA, USA. USENIX Association.<br />

Li, F. and Hsieh, M.-H. (2006). An empirical study of clustering behavior of spammers<br />

and group-based anti-spam strategies. Proceedings of the Third Conference on Email<br />

and Anti-Spam (CEAS). Mountain View, CA.<br />

Mycroft, A. and Sharp, R. (2001). Hardware/software co-<strong>de</strong>sign using functional languages.<br />

In Margaria, T. and Yi, W., editors, Tools and Algorithms for the Construction<br />

and Analysis of Systems, volume 2031 of Lecture Notes in Computer Science, pages<br />

236–251. Springer Berlin Hei<strong>de</strong>lberg.<br />

Pathak, A., Hu, Y. C., and Mao, Z. M. (2008). Peeking into spammer behavior from<br />

a unique vantage point. In LEET’08: Proceedings of the 1st Usenix Workshop on<br />

Large-Scale Exploits and Emergent Threats, pages 1–9, Berkeley, CA, USA. USENIX<br />

Association.<br />

Provos, N. (2004). A virtual honeypot framework. In Proceedings of the 13th conference<br />

on USENIX Security Symposium - Volume 13, SSYM’04, pages 1–1, Berkeley, CA,<br />

USA. USENIX Association.<br />

Provos, N. and Holz, T. (2007). Virtual Honeypots: From Botnet Tracking to Intrusion<br />

Detection. Addison-Wesley Professional.<br />

Radicati, S. (2009). Email statistics report, 2009-2013. Relatório anual, The Radicati<br />

Group, Inc. http://www.radicati.com/.<br />

Sardana, A. and Joshi, R. (2009). An auto-responsive honeypot architecture for dynamic<br />

resource allocation and qos adaptation in ddos attacked networks. Comput. Commun.,<br />

32:1384–1399.<br />

Shue, C. A., Gupta, M., Lubia, J. J., Kong, C. H., , and Yuksel, A. (2009). Spamology: A<br />

study of spam origins. In Conference on Email and Anti Spam (CEAS).<br />

Silva, G. C. (2011). Análise <strong>de</strong> fatores que afetam o comportamento <strong>de</strong> spammers na<br />

re<strong>de</strong>. Dissertação <strong>de</strong> mestrado, Universida<strong>de</strong> Fe<strong>de</strong>ral <strong>de</strong> Minas Gerais.<br />

Steding-Jessen, K., Vijaykumar, N. L., and Montes, A. (2008). Using low-interaction<br />

honeypots to study the abuse of open proxies to send spam. INFOCOMP Journal of<br />

Computer Science.<br />

154

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!