David Dagon
According to our database1,
David Dagon
authored at least 38 papers
between 2004 and 2017.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2017
IEEE Secur. Priv., 2017
Measuring lower bounds of the financial abuse to online advertisers: A four year case study of the TDSS/TDL4 Botnet.
Comput. Secur., 2017
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017
2016
Domain-Z: 28 Registrations Later Measuring the Exploitation of Residual Trust in Domains.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
Financial Lower Bounds of Online Advertising Abuse - A Four Year Case Study of the TDSS/TDL4 Botnet.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
2014
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
2013
Proceedings of the 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the Financial Cryptography and Data Security, 2011
2010
Proceedings of the 19th USENIX Security Symposium, 2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
2009
Proceedings of the Network and Distributed System Security Symposium, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
Proceedings of the Botnet Detection: Countering the Largest Security Threat, 2008
Proceedings of the Botnet Detection: Countering the Largest Security Threat, 2008
Proceedings of the Network and Distributed System Security Symposium, 2008
Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
2007
Proceedings of the First Workshop on Hot Topics in Understanding Botnets, 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
Proceedings of the 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet, 2006
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Proceedings of the Network and Distributed System Security Symposium, 2006
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems.
Proceedings of the Computer Security, 2006
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
2005
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005
Proceedings of the Financial Cryptography and Data Security, 2005
2004
IEEE Pervasive Comput., 2004
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004