발행물

전체 논문

102

51

Towards Complete Node Enumeration in a Peer-to-Peer Botnet.
B. Kang, E. Chan-Tin, C. Lee, J. Tyra, H. Kang, C. Nunnery, Z. Wadler, G. Sinclair, N. Hopper, D. Dagon, Y. Kim
ACM Symposium on Information, Computer & Communication Security (ASIACCS 2009), 2009

52

Hash History Approach for Reconciling Mutual Inconsistency
B. Kang, R. Wilensky, J. Kubiatowicz
Proceedings of 23rd International Conference on Distributed Computing Systems (ICDCS), 2003

53

Network Support for Mobile Multimedia using a Self-adaptive Distributed Proxy
Z. Mao, H. So, B. Kang, R. Katz
Proceedings of 11th International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV), 2001

54

Toward a Model of Self-administering Data
B. Kang, R. Wilensky
Proceedings of the first ACM/IEEE-CS Joint Conference on Digital Libraries (JCDL), 2001

55

Entropy-Based Measurement of IP Address Inflation in the Waledac Botnet
R. Weaver, C. Nunnery, G. Singaraju, B. Kang
CERT/CC (Computer Emergency Readiness Team) Proceedings of FloCon 2011, 1970

56

Tumbling Down the Rabbit Hole: Exploring the Idiosyncrasies of Botmaster Systems in a Multi-Tier Botnet Infrastructure.
C. Nunnery, G. Sinclair, B. Kang
USENIX LEET 2010, 2010

57

The Waledac Protocol: The How and Why.
G. Sinclair, C. Nunnery, B. Kang
IEEE Malware 2009, 2009

58

Tracking Email Reputation for Authenticated Sender Identities.
G. Singaraju, J. Moss, B. Kang
CEAS 2008, 2008

59

Concord: A Secure Mobile Data Authorization Framework for Regulatory Compliance.
G. Singaraju, B. Kang
LISA 2008, 2008

60

RepuScore: Collaborative Reputation Management Framework for Email Infrastructure.
G. Singaraju, B. Kang
LISA 2007, 2007