David Dittrich

According to our database1, David Dittrich authored at least 14 papers between 2000 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
The Internet Census 2012 Dataset: An Ethical Examination.
IEEE Technol. Soc. Mag., 2015

2012
The Menlo Report.
IEEE Secur. Priv., 2012

So You Want to Take Over a Botnet...
Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2012

It's Not Stealing If You Need It: A Panel on the Ethics of Performing Research Using Public Data of Illicit Origin.
Proceedings of the Financial Cryptography and Data Security, 2012

A Refined Ethical Impact Assessment Tool and a Case Study of Its Application.
Proceedings of the Financial Cryptography and Data Security, 2012

2011
Building an Active Computer Security Ethics Community.
IEEE Secur. Priv., 2011

Human Subjects, Agents, or Bots: Current Issues in Ethics and Computer Security Research.
Proceedings of the Financial Cryptography and Data Security, 2011

2010
A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets.
Proceedings of the Financial Cryptography and Data Security, 2010

2009
The Conflicts Facing Those Responding to Cyberconflict.
login Usenix Mag., 2009

Malware to Crimeware: How Far Have They Gone, and How Do We Catch Up?
login Usenix Mag., 2009

2008
P2P as botnet command and control: A deeper insight.
Proceedings of the 3rd International Conference on Malicious and Unwanted Software, 2008

2007
Analysis of the Storm and Nugache Trojans: P2P Is Here.
login Usenix Mag., 2007

Command and Control Structures in Malware: From Handler/Agent to P2P.
login Usenix Mag., 2007

2000
Analyzing Distributed Denial of Service Tools: The Shaft Case.
Proceedings of the 14th Conference on Systems Administration (LISA 2000), 2000


  Loading...