Automated classification and analysis of internet malware M Bailey, J Oberheide, J Andersen, ZM Mao, F Jahanian, J Nazario Recent Advances in Intrusion Detection: 10th International Symposium, RAID …, 2007 | 887 | 2007 |
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware X Chen, J Andersen, ZM Mao, M Bailey, J Nazario 2008 IEEE international conference on dependable systems and networks with …, 2008 | 509 | 2008 |
The internet motion sensor-a distributed blackhole monitoring system. MD Bailey, E Cooke, F Jahanian, J Nazario, D Watson NDSS, 2005 | 398 | 2005 |
As the net churns: Fast-flux botnet observations J Nazario, T Holz 2008 3rd International Conference on Malicious and Unwanted Software …, 2008 | 287 | 2008 |
Defense and detection strategies against Internet worms J Nazario Artech House, 2004 | 220 | 2004 |
PhoneyC: A Virtual Client Honeypot. J Nazario LEET 9, 911-919, 2009 | 202 | 2009 |
Politically motivated denial of service attacks J Nazario The virtual battlefield: Perspectives on cyber warfare, 163-181, 2009 | 132 | 2009 |
DDoS attack evolution J Nazario Network Security 2008 (7), 7-10, 2008 | 129 | 2008 |
Blackenergy ddos bot analysis J Nazario Arbor Networks, 2007 | 120 | 2007 |
Method and system for reducing scope of self-propagating attack code in network TH Ptacek, DJ Song, JO Nazario US Patent 7,596,807, 2009 | 113 | 2009 |
The future of Internet worms J Nazario, J Anderson, R Wash, C Connelly Black Hat USA, 2001 | 73 | 2001 |
Adjusting DDoS protection based on traffic type S Iekel-Johnson, A Campbell, LB Huston III, B Moran, J Edwards, ... US Patent 9,060,020, 2015 | 72 | 2015 |
Phishing corpus J Nazario Online: http://monkey. org/% 7Ejose/wiki/doku. php, 2007 | 71 | 2007 |
WebPatrol: Automated collection and replay of web-based malware scenarios KZ Chen, G Gu, J Zhuge, J Nazario, X Han Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011 | 67 | 2011 |
Worldwide infrastructure security report D McPherson, C Labovitz, M Hollyman, J Nazario, GR Malan October, 2008 | 56 | 2008 |
Estonian DDoS Attacks-A summary to date J Nazario | 38 | 2007 |
Twitter-based botnet command channel J Nazario Arbor Networks, http://asert. arbornetworks. com/2009/08/twitter-based …, 2009 | 36 | 2009 |
Botnet tracking: Tools, techniques, and lessons learned J Nazario Black Hat, 2007 | 28 | 2007 |
Worldwide infrastructure security report R Dobbins, C Morales, D Anstee, J Arruda, T Bienkowski, M Hollyman, ... Arbor networks annual survey, 2010 | 22 | 2010 |
Source Co de Scanners for Better Code J Nazario Jan—uary, 2002 | 19* | 2002 |