Sciweavers

INFOCOM
2011
IEEE
13 years 3 months ago
Identifying mobiles hiding behind wireless routers
—The network address translation technique (NAT) is widely used in wireless routers. It is a low cost solution to IPv4 address space limitations. However, cyber criminals may abu...
Yinjie Chen, Zhongli Liu, Benyuan Liu, Xinwen Fu, ...
ACNS
2011
Springer
244views Cryptology» more  ACNS 2011»
13 years 3 months ago
Quantitatively Analyzing Stealthy Communication Channels
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao
HICSS
2008
IEEE
118views Biometrics» more  HICSS 2008»
14 years 6 months ago
Towards a Methodology for Profiling Cyber Criminals
The progress of future e-business and ecommerce will depend on the ability of our legal institutions to protect general users from cyber crimes. While there has been substantial p...
Leonard Kwan, Pradeep Ray, Greg Stephens