What is it? @.@

Here is the place where I record some tactics about wargame, systems, and other security issues.

Research Studies

::[ Research Studies ]::
  • Botnet
  1. [Title] Survey and taxonomy of botnet research through life-cycle
    [URL] http://dl.acm.org/citation.cfm?id=2501654.2501659
    [Publication] Rodríguez-Gómez, Rafael A., Gabriel Maciá-Fernández, and Pedro García-Teodoro. "Survey and taxonomy of botnet research through life-cycle." ACM Computing Surveys (CSUR) 45.4 (2013): 45.
  2. [Title] Botnets: A survey
    [URL] http://dl.acm.org/citation.cfm?id=2450798
    [Publication] Silva, Sérgio SC, et al. "Botnets: A survey." Computer Networks (2012).
  • Malware
  1. [Title] A Survey on Automated Dynamic Malware-Analysis Techniques And Tools
    [URL] http://dl.acm.org/citation.cfm?id=2089125.2089126
    [Publication] Egele, Manuel, et al. "A survey on automated dynamic malware-analysis techniques and tools." ACM Computing Surveys (CSUR) 44.2 (2012): 6.
  • Mobile
  1. [Title] An Empirical Study of Cryptographic Misuse in Android Applications
    [URL] http://dl.acm.org/citation.cfm?id=2508859.2516693
    [Publication] Egele, Manuel, et al. "An empirical study of cryptographic misuse in android applications." Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. ACM, 2013.

No comments:

Post a Comment