5 works on record
Detection of Intrusions and Malware, and Vulnerability Assessment
Research in Attacks, Intrusions, and Defenses
Trust and Trustworthy Computing
Hacking Exposed Malware & Rootkits (Hacking Exposed)
Virtual honeypots