Understanding Malware’s Network Behaviors using Fantasm. Deng, X., Shi, H., & Mirkovic, J. In Learning from Authoritative Security Experiment Results (LASER) Workshop, 2017. USENIX Association. bibtex @inproceedings{deng2017understanding,
title={Understanding Malware’s Network Behaviors using Fantasm},
author={Deng, Xiyue and Shi, Hao and Mirkovic, Jelena},
booktitle={Learning from Authoritative Security Experiment Results (LASER) Workshop},
year={2017},
organization={USENIX Association}
}
Downloads: 0
{"_id":"xG3GPvwNd6RHmWa5n","bibbaseid":"deng-shi-mirkovic-understandingmalwaresnetworkbehaviorsusingfantasm-2017","author_short":["Deng, X.","Shi, H.","Mirkovic, J."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"Understanding Malware’s Network Behaviors using Fantasm","author":[{"propositions":[],"lastnames":["Deng"],"firstnames":["Xiyue"],"suffixes":[]},{"propositions":[],"lastnames":["Shi"],"firstnames":["Hao"],"suffixes":[]},{"propositions":[],"lastnames":["Mirkovic"],"firstnames":["Jelena"],"suffixes":[]}],"booktitle":"Learning from Authoritative Security Experiment Results (LASER) Workshop","year":"2017","organization":"USENIX Association","bibtex":"@inproceedings{deng2017understanding,\n title={Understanding Malware’s Network Behaviors using Fantasm},\n author={Deng, Xiyue and Shi, Hao and Mirkovic, Jelena},\n booktitle={Learning from Authoritative Security Experiment Results (LASER) Workshop},\n year={2017},\n organization={USENIX Association}\n}\n\n","author_short":["Deng, X.","Shi, H.","Mirkovic, J."],"key":"deng2017understanding","id":"deng2017understanding","bibbaseid":"deng-shi-mirkovic-understandingmalwaresnetworkbehaviorsusingfantasm-2017","role":"author","urls":{},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://bibbase.org/network/files/2WNBgwTRfefSKBGKb","dataSources":["nxSyfTE8ojajS8Wcm","2Fkx7mpveyLCGzDsW","smJny2HbQ4ct2q8T6","5ByepEgrvFujJFiRX"],"keywords":[],"search_terms":["understanding","malware","network","behaviors","using","fantasm","deng","shi","mirkovic"],"title":"Understanding Malware’s Network Behaviors using Fantasm","year":2017}