Tamara L. Berg, Alexander C. Berg, Jaety Edwards, Michael Maire, Ryan
White, Yee Whye Teh, Erik Learned-Miller, David A. Forsythm,
Names and
Faces in the News, Computer Vision and Pattern Recognition (CVPR), 2004.
Song, D. X., Wagner, D., and Tian, X. 2001, Timing analysis of
keystrokes and timing attacks on SSH, In Proceedings of the 10th
Conference on USENIX Security Symposium - Volume 10 (Washington, D.C.,
August 13 - 17, 2001). USENIX Security Symposium. USENIX Association,
Berkeley, CA, 25-25.
Konrad Rieck, Thorsten Holz, Carsten Willems, Patrick Dussel, Pavel Laskov,
Learning and Classification
of Malware Behavior. In Fifth Conference on Detection of Intrusions and Malware and
Vulnerability Assessment (DIMVA 08).
Ulrich Bayer, Paolo Milani Comparetti, Clemens Hlauschek, Christopher Kruegel, and Engin Kirda,
Scalable, Behavior-Based Malware Clustering,
In Proceedings of the Network and Distributed System Security Symposium, San Diego, California, USA, February 2009.