-
4
-
-
78649271735
-
-
The SpamAssassin Project. [July ].
-
The SpamAssassin Project. SpamAssassin. [July 2009 ].
-
(2009)
SpamAssassi
-
-
-
5
-
-
33645222306
-
How good are our weapons in the SPAM wars
-
Hoanca B,. How good are our weapons in the SPAM wars. IEEE Technology and Society magazine 2006; 25 (1): 22-30.
-
(2006)
IEEE Technology and Society Magazine
, vol.25
, Issue.1
, pp. 22-30
-
-
Hoanca, B.1
-
6
-
-
33750575122
-
Analyzing network traffic to detect e-mail spamming machines
-
In, Brighton, UK, November
-
Desika P, Srivastava J,. Analyzing network traffic to detect e-mail spamming machines. In Proceedings of the 2004 ICDM Workshop on Privacy and Security Aspects of Data Mining (PSDM'04), Brighton, UK, November 2004.
-
(2004)
Proceedings of the 2004 ICDM Workshop on Privacy and Security Aspects of Data Mining (PSDM'04)
-
-
Desika, P.1
Srivastava, J.2
-
7
-
-
70349858471
-
Inferring spammers in the network core
-
In, Seoul, Korea, April
-
Schatzmann D, Burkhart M, Spyropoulos T,. Inferring spammers in the network core. In Proceedings of 10th International Conference on Passive and Active Network Measurement (PAM'09), Seoul, Korea, April 2009.
-
(2009)
Proceedings of 10th International Conference on Passive and Active Network Measurement (PAM'09)
-
-
Schatzmann, D.1
Burkhart, M.2
Spyropoulos, T.3
-
8
-
-
77952388137
-
Filtering spam with behavioral blacklisting
-
In, Alexandria, VA, October
-
Ramachandran A, Feamste N, Vempala S,. Filtering spam with behavioral blacklisting. In Proceedings of the 14th ACM conference on Computer and Communications Security (CCS'07), Alexandria, VA, October 2007.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'07)
-
-
Ramachandran, A.1
Feamste, N.2
Vempala, S.3
-
9
-
-
85084096263
-
Peeking into spammer behavior from a unique vantage point
-
In, San Francisco, CA, April
-
Pathak A, Hu YC, Mao ZM,. Peeking into spammer behavior from a unique vantage point. In Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'08), San Francisco, CA, April 2008.
-
(2008)
Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'08)
-
-
Pathak, A.1
Hu, Y.C.2
Mao, Z.M.3
-
10
-
-
85084096033
-
On the spam campaign trail
-
In, San Francisco, CA, April
-
Kreibich C, Kanich C, Levchenko K, Enright B, Voelker GM, Paxson V, Savage S,. On the spam campaign trail. In Proceedings of 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'08), San Francisco, CA, April 2008.
-
(2008)
Proceedings of 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'08)
-
-
Kreibich, C.1
Kanich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.M.5
Paxson, V.6
Savage, S.7
-
11
-
-
85084095135
-
Characterizing botnets from email spam records
-
In, San Francisco, CA, April
-
Zhuang L, Dunagan J, Simon DR, Wang HJ, Osipkov I, Hulten G, Tygar JD,. Characterizing botnets from email spam records. In Proceedings of 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'08), San Francisco, CA, April 2008.
-
(2008)
Proceedings of 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'08)
-
-
Zhuang, L.1
Dunagan, J.2
Simon, D.R.3
Wang, H.J.4
Osipkov, I.5
Hulten, G.6
Tygar, J.D.7
-
12
-
-
78649289297
-
A stateful and flow-based intrusion prevention system for email applications
-
In, Dalian, China, September
-
Cheng B-C, Chen M-J, Chu Y-S, Chen A, Yap S, Fan K-P,. A stateful and flow-based intrusion prevention system for email applications. In Proceedings of the IFIP International Conference on Network and Parallel Computing (NPC'07), Dalian, China, September 2007.
-
(2007)
Proceedings of the IFIP International Conference on Network and Parallel Computing (NPC'07)
-
-
Cheng, B.1
Chen, M.2
Chu, Y.3
Chen, A.4
Yap, S.5
Fan, K.6
-
13
-
-
67649922127
-
Flow-level characteristics of spam and ham
-
Computer Engineering and Networks Laboratory, ETH, Zurich, Augus
-
Schatzmann D, Burkhart M, Spyropoulos T,. Flow-level characteristics of spam and ham. TIK Report No. 291, Computer Engineering and Networks Laboratory, ETH, Zurich, August 2008.
-
(2008)
TIK Report
, vol.291
-
-
Schatzmann, D.1
Burkhart, M.2
Spyropoulos, T.3
-
15
-
-
78649296763
-
Detecting spam at the network level
-
In, Barcelona, Spain, September
-
Sperotto A, Vliek G, Sadre R, Pras A,. Detecting spam at the network level. In Proceedings of the 15th EUNICE International Workshop (EUNICE'09), Barcelona, Spain, September 2009.
-
(2009)
Proceedings of the 15th EUNICE International Workshop (EUNICE'09)
-
-
Sperotto, A.1
Vliek, G.2
Sadre, R.3
Pras, A.4
-
16
-
-
70349848060
-
-
MSc thesis, University of Twente, Netherlands, February. [9 June 2010]
-
Vliek G., Detecting spam machines, a Netflow-data based approach. MSc thesis, University of Twente, Netherlands, February 2009. [9 June 2010].
-
(2009)
Detecting Spam Machines, A Netflow-data Based Approach
-
-
Vliek, G.1
-
17
-
-
78649233234
-
-
Spamhaus Project. ZEN. [July ]
-
Spamhaus Project. ZEN. [July 2009 ].
-
(2009)
-
-
-
20
-
-
14944385133
-
An empirical study of spam traffic and the use of DNS black lists
-
In, Taormina, Sicily, October
-
Jung J, Sit E,. An empirical study of spam traffic and the use of DNS black lists. In Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC'04), Taormina, Sicily, October 2004.
-
(2004)
Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC'04)
-
-
Jung, J.1
Sit, E.2
-
21
-
-
33847737144
-
Understanding the network-level behavior of spammers
-
Pisa, Italy, September
-
Ramachandran A, Feamster N,. Understanding the network-level behavior of spammers. In Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM'06), Pisa, Italy, September 2006.
-
(2006)
Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM'06)
-
-
Ramachandran, A.1
Feamster, N.2
-
22
-
-
84904819221
-
Can DNS-based blacklists keep up with bots
-
In, Mountain View, CA, July
-
Ramachandran A, Dagon D, Feamster N,. Can DNS-based blacklists keep up with bots- In Proceedings of the 3rd Conference on Email and Anti-Spam (CEAS'06), Mountain View, CA, July 2006.
-
(2006)
Proceedings of the 3rd Conference on Email and Anti-Spam (CEAS'06)
-
-
Ramachandran, A.1
Dagon, D.2
Feamster, N.3
-
23
-
-
85000701895
-
My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging
-
In, Cambridge, MA, April
-
Rajab MA, Zarfoss J, Monrose F, Terzis A,. My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging. In Proceedings of the 1st USENIX Workshop on Hot Topics in Understanding Botnets (HotBots'07), Cambridge, MA, April 2007.
-
(2007)
Proceedings of the 1st USENIX Workshop on Hot Topics in Understanding Botnets (HotBots'07)
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
25
-
-
70350307600
-
High level Internet scale traffic visualization using Hilbert curve mapping
-
In, Sacramento, CA, October
-
Irwin B, Pilkington N,. High level Internet scale traffic visualization using Hilbert curve mapping. In Proceedings of the Workshop on Visualization for Computer Security (VizSEC 2007), Sacramento, CA, October 2007.
-
(2007)
Proceedings of the Workshop on Visualization for Computer Security (VizSEC 2007)
-
-
Irwin, B.1
Pilkington, N.2
-
26
-
-
42149173109
-
Using uncleanliness to predict future botnet addresses
-
In, San Diego, CA, October
-
Collins MP, Shimeall TJ, Faber S, Janies J, Weaver R, De Shon M, Kadane JB,. Using uncleanliness to predict future botnet addresses. In Proceedings of the ACM SIGCOMM Conference on Internet Measurement (IMC'07), San Diego, CA, October 2007.
-
(2007)
Proceedings of the ACM SIGCOMM Conference on Internet Measurement (IMC'07)
-
-
Collins, M.P.1
Shimeall, T.J.2
Faber, S.3
Janies, J.4
Weaver, R.5
De Shon, M.6
Kadane, J.B.7
-
28
-
-
78649255905
-
-
SURBL. [July ]
-
SURBL. [July 2009 ].
-
(2009)
-
-
-
30
-
-
78649274383
-
-
CBL. [July ]
-
CBL. [July 2009 ].
-
(2009)
-
-
-
31
-
-
78649275259
-
-
DSBL.org. [November ]
-
DSBL.org. [November 2008 ].
-
(2008)
-
-
-
33
-
-
78649281016
-
-
Spamhaus Project. DROP. [July ]
-
Spamhaus Project. DROP. [July 2009 ].
-
(2009)
-
-
-
35
-
-
78649264559
-
-
Wireshark. [July ]
-
Combs G,. Wireshark. [July 2009 ].
-
(2009)
-
-
Combs, G.1
-
36
-
-
78649239463
-
-
ImproWare. Swinog URIBL. [July ]
-
ImproWare. Swinog URIBL. [July 2009 ].
-
(2009)
-
-
|