{"_id":"xbzn34RS4t5gwaf2M","bibbaseid":"baecher-koetter-holz-dornseif-freiling-thenepenthesplatformanefficientapproachtocollectmalware-2006","downloads":0,"creationDate":"2017-09-27T10:54:12.989Z","title":"The Nepenthes Platform: An Efficient Approach to Collect Malware","author_short":["Baecher, P.","Koetter, M.","Holz, T.","Dornseif, M.","Freiling, F. C."],"year":2006,"bibtype":"inproceedings","biburl":"http://dblp.org/pers/tb2/h/Holz:Thorsten","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Paul"],"propositions":[],"lastnames":["Baecher"],"suffixes":[]},{"firstnames":["Markus"],"propositions":[],"lastnames":["Koetter"],"suffixes":[]},{"firstnames":["Thorsten"],"propositions":[],"lastnames":["Holz"],"suffixes":[]},{"firstnames":["Maximillian"],"propositions":[],"lastnames":["Dornseif"],"suffixes":[]},{"firstnames":["Felix","C."],"propositions":[],"lastnames":["Freiling"],"suffixes":[]}],"title":"The Nepenthes Platform: An Efficient Approach to Collect Malware","booktitle":"Recent Advances in Intrusion Detection, 9th International Symposium, RAID 2006, Hamburg, Germany, September 20-22, 2006, Proceedings","pages":"165--184","year":"2006","crossref":"DBLP:conf/raid/2006","url":"https://doi.org/10.1007/11856214_9","doi":"10.1007/11856214_9","timestamp":"Fri, 02 Jun 2017 13:01:08 +0200","biburl":"http://dblp.org/rec/bib/conf/raid/BaecherKHDF06","bibsource":"dblp computer science bibliography, http://dblp.org","bibtex":"@inproceedings{DBLP:conf/raid/BaecherKHDF06,\n author = {Paul Baecher and\n Markus Koetter and\n Thorsten Holz and\n Maximillian Dornseif and\n Felix C. Freiling},\n title = {The Nepenthes Platform: An Efficient Approach to Collect Malware},\n booktitle = {Recent Advances in Intrusion Detection, 9th International Symposium,\n {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},\n pages = {165--184},\n year = {2006},\n crossref = {DBLP:conf/raid/2006},\n url = {https://doi.org/10.1007/11856214_9},\n doi = {10.1007/11856214_9},\n timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},\n biburl = {http://dblp.org/rec/bib/conf/raid/BaecherKHDF06},\n bibsource = {dblp computer science bibliography, http://dblp.org}\n}\n\n","author_short":["Baecher, P.","Koetter, M.","Holz, T.","Dornseif, M.","Freiling, F. C."],"key":"DBLP:conf/raid/BaecherKHDF06","id":"DBLP:conf/raid/BaecherKHDF06","bibbaseid":"baecher-koetter-holz-dornseif-freiling-thenepenthesplatformanefficientapproachtocollectmalware-2006","role":"author","urls":{"Paper":"https://doi.org/10.1007/11856214_9"},"downloads":0},"search_terms":["nepenthes","platform","efficient","approach","collect","malware","baecher","koetter","holz","dornseif","freiling"],"keywords":[],"authorIDs":[],"dataSources":["nsffQ5pYkGG38Yzs3"]}