-
1
-
-
77952131053
-
-
"Its not about the spam," http://googleblog.blogspot.com/2007/ 10/its-not-about-spam.html.
-
Its Not about the Spam
-
-
-
3
-
-
79959461005
-
-
IRTF Anti-Spam Rsearch Group, Nov internet Draft draft-irtf-asrg-dnsbl- 08.txt
-
J. Levine, DNS Blacklists and Whitelists, IRTF Anti-Spam Rsearch Group, Nov 2008, internet Draft draft-irtf-asrg-dnsbl-08.txt.
-
(2008)
DNS Blacklists and Whitelists
-
-
Levine, J.1
-
5
-
-
77952208527
-
-
"The Spamhaus Project," http://www.spamhaus.org/.
-
-
-
-
6
-
-
77952151260
-
-
"SenderBase," http://www.senderbase.org/.
-
-
-
-
7
-
-
77952231771
-
-
"Greylisting," http://www.greylisting.org/.
-
-
-
-
9
-
-
77952134045
-
-
"IRTF The Anti Spam Research Group wiki, DNS validation," http://wiki.asrg.sp.am/wiki/DNS-validation.
-
-
-
-
12
-
-
58449122201
-
Spamming botnets: Signatures and characteristics
-
Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov, "Spamming botnets: signatures and characteristics," in SIGCOMM, 2008.
-
(2008)
SIGCOMM
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
-
13
-
-
2942728016
-
Telling humans and computers apart automatically
-
2004
-
L. von Ahn, M. Blum, and J. Langford, "Telling humans and computers apart automatically," in Commun. ACM, 47(2):56-60, 2004., 2004.
-
(2004)
Commun. ACM
, vol.47
, Issue.2
, pp. 56-60
-
-
Von Ahn, L.1
Blum, M.2
Langford, J.3
-
14
-
-
77952129089
-
-
Hotmail Operators: Private Communication
-
"Hotmail Operators: Private Communication."
-
-
-
-
15
-
-
33847737144
-
Understanding the network-level behavior of spammers
-
A. Ramachandran and N. Feamster, "Understanding the network-level behavior of spammers," in SIGCOMM, 2006.
-
(2006)
SIGCOMM
-
-
Ramachandran, A.1
Feamster, N.2
-
18
-
-
36949011812
-
How dynamic are ip addresses?
-
Y. Xie, F. Yu, K. Achan, E. Gillum, M. Goldszmidt, and T. Wobber, "How dynamic are ip addresses?" in SIGCOMM, 2007.
-
(2007)
SIGCOMM
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Gillum, E.4
Goldszmidt, M.5
Wobber, T.6
-
19
-
-
77952141333
-
-
"Not Just Another Bogus List," http://www.njabl.org/.
-
-
-
-
22
-
-
33644589297
-
-
"Levenshtein Distance," http://en.wikipedia.org/wiki/ Levenshtein-distance/.
-
Levenshtein Distance
-
-
-
23
-
-
84904823170
-
Router-level spam filtering using tcp fingerprints: Architecture and measurement-based evaluation
-
H. Esquivel, T. Mori, and A. Akella, "Router-level spam filtering using tcp fingerprints: Architecture and measurement-based evaluation," in CEAS, 2009.
-
(2009)
CEAS
-
-
Esquivel, H.1
Mori, T.2
Akella, A.3
-
24
-
-
77952231132
-
Understanding the world.s worst spamming botnet
-
June
-
T. Mori, H. Esquivel, A. Akella, A. Shimoda, and S. Goto, "Understanding the world.s worst spamming botnet," University of Wisconsin Madison Tech Report TR1660, June 2009.
-
(2009)
University of Wisconsin Madison Tech Report TR1660
-
-
Mori, T.1
Esquivel, H.2
Akella, A.3
Shimoda, A.4
Goto, S.5
-
26
-
-
77952178916
-
-
BGP Tables from the University of Oregon RouteViews Project
-
"BGP Tables from the University of Oregon RouteViews Project," http://moat.nlanr.net/AS/data.
-
-
-
-
27
-
-
77952717608
-
Revealing botnet membership using DNSBL counter-intelligence
-
A. Ramachandran, N. Feamster, and D. Dagon, "Revealing botnet membership using DNSBL counter-intelligence," in SRUTI, 2006.
-
(2006)
SRUTI
-
-
Ramachandran, A.1
Feamster, N.2
Dagon, D.3
-
29
-
-
36949036650
-
A light-weight distributed scheme for detecting ip prefix hijacks in real-time
-
C. Zheng, L. Ji, D. Pei, J. Wang, and P. Francis, "A light-weight distributed scheme for detecting ip prefix hijacks in real-time," SIGCOMM, 2007.
-
(2007)
SIGCOMM
-
-
Zheng, C.1
Ji, L.2
Pei, D.3
Wang, J.4
Francis, P.5
-
30
-
-
77952202413
-
-
"Distributed Sender Black List," http://dsbl.org/usage.
-
-
-
-
33
-
-
70350215415
-
Exploiting network structure for proactive spam mitigation
-
S. Venkataraman, S. Sen, O. Spatscheck, P. Haffner, and D. Song, "Exploiting network structure for proactive spam mitigation," in USENIX Security, 2007.
-
(2007)
USENIX Security
-
-
Venkataraman, S.1
Sen, S.2
Spatscheck, O.3
Haffner, P.4
Song, D.5
-
34
-
-
77954873991
-
Exploiting transport-level characteristics of spam
-
Aug.
-
R. Beverly and K. Sollins, "Exploiting transport-level characteristics of spam," in CEAS, Aug. 2008.
-
(2008)
CEAS
-
-
Beverly, R.1
Sollins, K.2
-
35
-
-
14944385133
-
An empirical study of spam traffic and the use of DNS black lists
-
J. Jung and E. Sit, "An empirical study of spam traffic and the use of DNS black lists," in IMC, 2004.
-
(2004)
IMC
-
-
Jung, J.1
Sit, E.2
|