-
1
-
-
58149087571
-
-
The apache spamassassin project. htzp://spamassassin. apache.org
-
The apache spamassassin project. htzp://spamassassin. apache.org/.
-
-
-
-
2
-
-
84878170020
-
-
Gentoo linux. http://www.genzoo.org/.
-
Gentoo linux
-
-
-
5
-
-
58149098231
-
-
Pyzor. http://pyzor.sourceforge.ner/.
-
Pyzor
-
-
-
6
-
-
58149086471
-
-
Sorbs DNSBL. http://www.sorbs.net.
-
Sorbs DNSBL
-
-
-
7
-
-
58149101796
-
-
spamcop.net - beware of cheap imitations. htzp://www.sparr.cop.net/.
-
spamcop.net - beware of cheap imitations. htzp://www.sparr.cop.net/.
-
-
-
-
8
-
-
58149091082
-
-
The spamhaus project
-
The spamhaus project, http://www.spamhaus.org.
-
-
-
-
9
-
-
58149096417
-
-
Vipul's razor, hzzp://razor, sourceforge.net
-
Vipul's razor, hzzp://razor, sourceforge.net/.
-
-
-
-
10
-
-
58149097306
-
-
Arbor Networks. Worldwide infrastructure security report, Sept. 2007.
-
Arbor Networks. Worldwide infrastructure security report, Sept. 2007.
-
-
-
-
11
-
-
58149084148
-
Automated classification and analysis of internet malware
-
September
-
Michael Bailey, Jon Oberheide, Jon Andersen, Z. Morley Mao, Farnam Jahanian, and Jose Nazario. Automated classification and analysis of internet malware. In Proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection (RAID'07), September 2007.
-
(2007)
Proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection (RAID'07)
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Morley Mao, Z.4
Jahanian, F.5
Nazario, J.6
-
12
-
-
84904819221
-
Can dns-based blacklists keep up with bots?
-
Anirudh Ramachandran, David Dagon, and Nick Feamster. Can dns-based blacklists keep up with bots? In CEAS, 2006.
-
(2006)
CEAS
-
-
Ramachandran, A.1
Dagon, D.2
Feamster, N.3
-
13
-
-
33750365498
-
Understanding the network-level behavior of spammers
-
New York, NY, USA, ACM Press
-
Anirudh Ramachandran and Nick Feamster. Understanding the network-level behavior of spammers. In SIGCOMM '06: Conference on Applications, technologies, architectures, and protocols for computer communications, pages 291-302, New York, NY, USA, 2006. ACM Press.
-
(2006)
SIGCOMM '06: Conference on Applications, technologies, architectures, and protocols for computer communications
, pp. 291-302
-
-
Ramachandran, A.1
Feamster, N.2
-
14
-
-
77952388137
-
Filtering spam with behavioral blacklisting
-
New York, NY, USA, ACM
-
Anirudh Ramachandran, Nick Feamster, and Santosh Vem-pala. Filtering spam with behavioral blacklisting. In CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, pages 342-351, New York, NY, USA, 2007. ACM.
-
(2007)
CCS '07: Proceedings of the 14th ACM conference on Computer and communications security
, pp. 342-351
-
-
Ramachandran, A.1
Feamster, N.2
Vem-pala, S.3
-
16
-
-
70350215415
-
Exploiting network structure for proactive spam mitigation
-
Berkeley, CA, USA, USENIX Association
-
Shobha Venkataraman, Subhabrata Sen, Oliver Spatscheck, Patrick Haffher, and Dawn Song. Exploiting network structure for proactive spam mitigation. In Proceedings of 16th USENIX Security Symposium, pages 1-18, Berkeley, CA, USA, 2007. USENIX Association.
-
(2007)
Proceedings of 16th USENIX Security Symposium
, pp. 1-18
-
-
Venkataraman, S.1
Sen, S.2
Spatscheck, O.3
Haffher, P.4
Song, D.5
-
17
-
-
58149098549
-
-
Tim Weber. Criminals may overwhelm the web. hztp://news.bbc.co.uk/1/hi/ business/6298641.stir, January 2007.
-
Tim Weber. Criminals may overwhelm the web. hztp://news.bbc.co.uk/1/hi/ business/6298641.stir, January 2007.
-
-
-
-
18
-
-
58149083894
-
-
Rafal Wojtczuk. libnids, June 2004.
-
Rafal Wojtczuk. libnids, June 2004.
-
-
-
-
19
-
-
36949011812
-
How dynamic are IP addresses?
-
New York, USA
-
Yinglian Xie, Fang Yu, Kannan Achan, Eliot Gillum, Metises Goldszmidt, and Ted Wobber. How dynamic are IP addresses? In SIGCOMM '07: Conference on Applications, technologies, architectures, and protocols for computer communications, pages 301-312, New York, USA, 2007.
-
(2007)
SIGCOMM '07: Conference on Applications, technologies, architectures, and protocols for computer communications
, pp. 301-312
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Gillum, E.4
Goldszmidt, M.5
Wobber, T.6
|