-
1
-
-
85170010786
-
-
Apache SpamAssassin. http://spamassassin.apache.org/.
-
-
-
-
2
-
-
85170021426
-
-
CAIDA. http://www.caida.org/.
-
-
-
-
4
-
-
85170020097
-
-
Internet Assigned Numbers Authority. http://www.iana.org/.
-
-
-
-
6
-
-
85170012634
-
-
Proofpoint, Inc. http://www.proofpoint.com/.
-
-
-
-
7
-
-
85170003429
-
-
Spamhaus Project. http://www.spamhaus.org/.
-
-
-
-
8
-
-
85170005801
-
-
Univ. of Oregon Route Views. http://www.routeviews.org/.
-
-
-
-
9
-
-
85170008362
-
Dynamic trust management
-
M. Blaze, S. Kannan, A. D. Keromytis, I. Lee, W. Lee, O. Sokolsky, and J. M. Smith. Dynamic trust management. IEEE Computer (Special Issue on Trust Mangement), 2009.
-
(2009)
IEEE Computer (Special Issue on Trust Mangement)
-
-
Blaze, M.1
Kannan, S.2
Keromytis, A.D.3
Lee, I.4
Lee, W.5
Sokolsky, O.6
Smith, J.M.7
-
10
-
-
4544304744
-
The Sybil attack
-
March
-
J. Douceur. The Sybil attack. In 1st IPTPS, March 2002.
-
(2002)
1st IPTPS
-
-
Douceur, J.1
-
11
-
-
85041447270
-
Detecting spammers with SNARE: Spatio-temporal network-level automated reputation engine
-
S. Hao, N. A. Syed, N. Feamster, A. G. Gray, and S. Krasser. Detecting spammers with SNARE: Spatio-temporal network-level automated reputation engine. In USENIX Security Sym., 2009.
-
USENIX Security Sym., 2009
-
-
Hao, S.1
Syed, N.A.2
Feamster, N.3
Gray, A.G.4
Krasser, S.5
-
12
-
-
85170014546
-
-
IronPort Systems Inc. White Paper, SenderBase
-
IronPort Systems Inc. Reputation-basedmail flow control. White Paper, 2002. (SenderBase).
-
(2002)
Reputation-basedmail Flow Control
-
-
-
13
-
-
0002714543
-
Making Large-scale SVM Learning Practical
-
chapter MIT Press, Cambridge, MA
-
T. Joachims. Advances in Kernel Methods - Support Vector Learning, chapter Making Large-scale SVM Learning Practical, pages 169-184. MIT Press, Cambridge, MA, 1999.
-
(1999)
Advances in Kernel Methods - Support Vector Learning
, pp. 169-184
-
-
Joachims, T.1
-
17
-
-
78751537285
-
-
November McColo.
-
B. Krebs. Host of Internet spam groups is cut off. http://www. washingtonpost.com/wp-dyn/content/article/2008/11/12/AR2008111200658.html, November 2008. (McColo).
-
(2008)
Host of Internet Spam Groups Is Cut Off
-
-
Krebs, B.1
-
27
-
-
84858728623
-
Tracking dynamic sources of malicious activity at internet scale
-
S. Venkataraman, A. Blum, D. Song, S. Sen, and O. Spatscheck. Tracking dynamic sources of malicious activity at internet scale. In Neural Information Processing Systems '09, 2009.
-
(2009)
Neural Information Processing Systems '09
-
-
Venkataraman, S.1
Blum, A.2
Song, D.3
Sen, S.4
Spatscheck, O.5
-
28
-
-
70350215415
-
Exploiting network structure for proactive spam mitigation
-
S. Venkataraman, S. Sen, O. Spatscheck, P. Haffner, and D. Song. Exploiting network structure for proactive spam mitigation. In 16th USENIX Security Symposium, pages 149-166, 2007.
-
(2007)
16th USENIX Security Symposium
, pp. 149-166
-
-
Venkataraman, S.1
Sen, S.2
Spatscheck, O.3
Haffner, P.4
Song, D.5
-
29
-
-
70349135404
-
QuanTM: A quantitative trust management system
-
March
-
A. G. West, A. J. Aviv, J. Chang, V. S. Prabhu, M. Blaze, S. Kannan, I. Lee, J. M. Smith, and O. Sokolsky. QuanTM: A quantitative trust management system. In EUROSEC 2009, pages 28-35, March 2009.
-
(2009)
EUROSEC 2009
, pp. 28-35
-
-
West, A.G.1
Aviv, A.J.2
Chang, J.3
Prabhu, V.S.4
Blaze, M.5
Kannan, S.6
Lee, I.7
Smith, J.M.8
Sokolsky, O.9
-
30
-
-
77952379646
-
Detecting Wikipedia vandalism via spatio-temporal analysis of revision metadata
-
Paris, France
-
A. G. West, S. Kannan, and I. Lee. Detecting Wikipedia vandalism via spatio-temporal analysis of revision metadata. In EUROSEC '10, pages 22-28, Paris, France, 2010.
-
(2010)
EUROSEC '10
, pp. 22-28
-
-
West, A.G.1
Kannan, S.2
Lee, I.3
-
31
-
-
36949011812
-
How dynamic are IP addresses?
-
Y. Xie, F. Yu, K. Achan, E. Gillum, M. Goldszmidt, and T.Wobber. How dynamic are IP addresses? In SIGCOMM '07, 2007.
-
(2007)
SIGCOMM '07
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Gillum, E.4
Goldszmidt, M.5
Wobber, T.6
|