-
2
-
-
3843075559
-
An evaluation of naive Bayesian anti-spam filtering
-
I. Androutsopoulos, J. Koutsias, K. Chandrinos, G. Paliouras, and C. D. Spyropoulos. An Evaluation of Naive Bayesian Anti-Spam Filtering. In Proc. of 1st MLNIA, 2000.
-
(2000)
Proc. of 1st MLNIA
-
-
Androutsopoulos, I.1
Koutsias, J.2
Chandrinos, K.3
Paliouras, G.4
Spyropoulos, C.D.5
-
5
-
-
84877759806
-
Geolocalization of proxied services and its application to fast-flux hidden servers
-
C. Castelluccia, M. A. Kaafar, P. Manils, and D. Perito. Geolocalization of Proxied Services and its Application to Fast-Flux Hidden Servers. In Proc. of 9th IMC, 2009.
-
(2009)
Proc. of 9th IMC
-
-
Castelluccia, C.1
Kaafar, M.A.2
Manils, P.3
Perito, D.4
-
6
-
-
84904817958
-
How much did shutting down McColo help?
-
R. Clayton. How much did shutting down McColo help? In Proc. of 6th CEAS, 2009.
-
(2009)
Proc. of 6th CEAS
-
-
Clayton, R.1
-
7
-
-
85177654650
-
-
Dancho Danchev's Blog - Mind Streams of Information Security Knowledge. The Avalanche Botnet and the TROYAK-AS Connection. http://ddanchev.blogspot.com/ 2010/05/avalanche-botnet-and-troyak-as.html, 2010.
-
(2010)
The Avalanche Botnet and the TROYAK-AS Connection
-
-
-
9
-
-
84904807205
-
KaPoW webmail: Effective disincentives against spam
-
W. Feng and E. Kaiser. kaPoW Webmail: Effective Disincentives Against Spam. In Proc. of 7th CEAS, 2010.
-
(2010)
Proc. of 7th CEAS
-
-
Feng, W.1
Kaiser, E.2
-
11
-
-
85177659579
-
-
Gamblingplanet.org
-
Gamblingplanet.org. Visa blocks gaming transactions for US players. http://www.gamblingplanet.org/news/Visa-blocks-gaming-transactions-for-US- players/022310, 2010.
-
(2010)
Visa Blocks Gaming Transactions for US Players
-
-
-
13
-
-
85175133385
-
BotSniffer: Detecting botnet command and control channels in network traffic
-
G. Gu, J. Zhang, and W. Lee. BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic. In Proc. of 15th NDSS, 2008.
-
(2008)
Proc. of 15th NDSS
-
-
Gu, G.1
Zhang, J.2
Lee, W.3
-
14
-
-
85041447270
-
Detecting spammers with SNARE: Spatio-temporal NetworkLevel automated reputation engine
-
S. Hao, N. Feamster, A. Gray, N. Syed, and S. Krasser. Detecting Spammers with SNARE: Spatio-Temporal NetworkLevel Automated Reputation Engine. In Proc. of 18th USENIX Security, 2009.
-
(2009)
Proc. of 18th USENIX Security
-
-
Hao, S.1
Feamster, N.2
Gray, A.3
Syed, N.4
Krasser, S.5
-
15
-
-
81255149250
-
Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy
-
C. Herley and D. Florencio. Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy. In Proc. of 8th WEIS, 2009.
-
(2009)
Proc. of 8th WEIS
-
-
Herley, C.1
Florencio, D.2
-
16
-
-
78649809598
-
Learning more about the underground economy: A case-study of keyloggers and dropzones
-
T. Holz, M. Engelberth, and F. Freiling. Learning More About the Underground Economy: A Case-Study of Keyloggers and Dropzones. In Proc. of 15th ESORICS, 2009.
-
(2009)
Proc. of 15th ESORICS
-
-
Holz, T.1
Engelberth, M.2
Freiling, F.3
-
19
-
-
67249153096
-
Evolutionary study of phishing
-
D. Irani, S. Webb, J. Giffin, and C. Pu. Evolutionary Study of Phishing. In eCrime Researchers Summit, pages 1-10, 2008.
-
(2008)
ECrime Researchers Summit
, pp. 1-10
-
-
Irani, D.1
Webb, S.2
Giffin, J.3
Pu, C.4
-
21
-
-
70349272437
-
Spamalytics: An empirical analysis of spam marketing conversion
-
C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. M. Voelker, V. Paxson, and S. Savage. Spamalytics: An Empirical Analysis of Spam Marketing Conversion. In Proc. of 15th ACM CCS, 2008.
-
(2008)
Proc. of 15th ACM CCS
-
-
Kanich, C.1
Kreibich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.M.5
Paxson, V.6
Savage, S.7
-
23
-
-
85177681505
-
-
Krebs on Security. Body Armor for Bad Web Sites. http://krebsonsecurity. com/2010/11/body-armor-for-bad-web-sites/, 2010.
-
(2010)
Body Armor for Bad Web Sites
-
-
-
24
-
-
85084095449
-
Spamcraft: An inside look at spam campaign orchestration
-
C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. M. Voelker, V. Paxson, and S. Savage. Spamcraft: An Inside Look at Spam Campaign Orchestration. In Proc. of 2nd USENIX LEET, 2009.
-
(2009)
Proc. of 2nd USENIX LEET
-
-
Kreibich, C.1
Kanich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.M.5
Paxson, V.6
Savage, S.7
-
29
-
-
85084094479
-
On the effects of registrarlevel intervention
-
H. Liu, K. Levchenko, M. Félegyházi, C. Kreibich, G. Maier, G. M. Voelker, and S. Savage. On the Effects of Registrarlevel Intervention. In Proc. of 4th USENIX LEET, 2011.
-
(2011)
Proc. of 4th USENIX LEET
-
-
Liu, H.1
Levchenko, K.2
Félegyházi, M.3
Kreibich, C.4
Maier, G.5
Voelker, G.M.6
Savage, S.7
-
31
-
-
80051956263
-
-
M86 Security Labs. Top Spam Affiliate Programs. http://www.m86security. com/labs/traceitem.asp?article=1070, 2009.
-
(2009)
Top Spam Affiliate Programs
-
-
-
32
-
-
71149108237
-
Identifying suspicious URLs: An application of large-scale online learning
-
J. Ma, L. K. Saul, S. Savage, and G. M. Voelker. Identifying Suspicious URLs: An Application of Large-Scale Online Learning. In Proc. of 26th ICML, 2009.
-
(2009)
Proc. of 26th ICML
-
-
Ma, J.1
Saul, L.K.2
Savage, S.3
Voelker, G.M.4
-
34
-
-
78751501312
-
This is your data on drugs: Lessons computer security can learn from the drug war
-
D. Molnar, S. Egelman, and N. Christin. This Is Your Data on Drugs: Lessons Computer Security Can Learn From The Drug War. In Proc. of 13th NSPW, 2010.
-
(2010)
Proc. of 13th NSPW
-
-
Molnar, D.1
Egelman, S.2
Christin, N.3
-
35
-
-
45949085773
-
The impact of incentives on notice and take-down
-
T. Moore and R. Clayton. The Impact of Incentives on Notice and Take-down. In Proc. of 7th WEIS, 2008.
-
(2008)
Proc. of 7th WEIS
-
-
Moore, T.1
Clayton, R.2
-
37
-
-
85076285223
-
Re: Captchas - Understanding CAPTCHA solving from an economic context
-
M. Motoyama, K. Levchenko, C. Kanich, D. McCoy, G. M. Voelker, and S. Savage. Re: CAPTCHAs - Understanding CAPTCHA Solving from an Economic Context. In Proc. of 19th USENIX Security, 2010.
-
(2010)
Proc. of 19th USENIX Security
-
-
Motoyama, M.1
Levchenko, K.2
Kanich, C.3
McCoy, D.4
Voelker, G.M.5
Savage, S.6
-
38
-
-
85177681328
-
-
A. Mutton. Screengrab! http://www.screengrab.org/, 2010.
-
(2010)
-
-
Mutton, A.1
-
39
-
-
84893520306
-
A quantitative study of forum spamming using context-based analysis
-
Y. Niu, Y.-M. Wang, H. Chen, M. Ma, and F. Hsu. A Quantitative Study of Forum Spamming Using Context-based Analysis. In Proc. of 14th NDSS, 2007.
-
(2007)
Proc. of 14th NDSS
-
-
Niu, Y.1
Wang, Y.-M.2
Chen, H.3
Ma, M.4
Hsu, F.5
-
40
-
-
85084096629
-
Tumbling down the rabbit hole: Exploring the idiosyncrasies of botmaster systems in a multi-tier botnet infrastructure
-
C. Nunnery, G. Sinclair, and B. B. Kang. Tumbling Down the Rabbit Hole: Exploring the Idiosyncrasies of Botmaster Systems in a Multi-Tier Botnet Infrastructure. In Proc. of 3rd USENIX LEET, 2010.
-
(2010)
Proc. of 3rd USENIX LEET
-
-
Nunnery, C.1
Sinclair, G.2
Kang, B.B.3
-
42
-
-
77950795817
-
Detecting malicious flux service networks through passive analysis of recursive DNS traces
-
R. Perdisci, I. Corona, D. Dagon, and W. Lee. Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces. In Proc. of 25th ACSAC, 2009.
-
(2009)
Proc. of 25th ACSAC
-
-
Perdisci, R.1
Corona, I.2
Dagon, D.3
Lee, W.4
-
43
-
-
82955238527
-
Botnet judo: Fighting spam with itself
-
A. Pitsillidis, K. Levchenko, C. Kreibich, C. Kanich, G. Voelkera, V. Paxson, N. Weaver, and S. Savage. Botnet Judo: Fighting Spam with Itself. In Proc. of 17th NDSS, 2010.
-
(2010)
Proc. of 17th NDSS
-
-
Pitsillidis, A.1
Levchenko, K.2
Kreibich, C.3
Kanich, C.4
Voelkera, G.5
Paxson, V.6
Weaver, N.7
Savage, S.8
-
47
-
-
58149096147
-
Shades of grey: On the effectiveness of reputation-based "blacklists,"
-
S. Sinha, M. Bailey, and F. Jahanian. Shades of Grey: On the effectiveness of reputation-based "blacklists". In Proc. of 3rd MALWARE, 2008.
-
(2008)
Proc. of 3rd MALWARE
-
-
Sinha, S.1
Bailey, M.2
Jahanian, F.3
-
48
-
-
84968706754
-
Improving SPAM blacklisting through dynamic thresholding and speculative aggregation
-
S. Sinha, M. Bailey, and F. Jahanian. Improving SPAM Blacklisting through Dynamic Thresholding and Speculative Aggregation. In Proc. of 17th NDSS, 2010.
-
(2010)
Proc. of 17th NDSS
-
-
Sinha, S.1
Bailey, M.2
Jahanian, F.3
-
50
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna. Your Botnet Is My Botnet: Analysis of a Botnet Takeover. In Proc. of 16th ACM CCS, 2009.
-
(2009)
Proc. of 16th ACM CCS
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
51
-
-
77950794331
-
FIRE: Finding rogue nEtworks
-
B. Stone-Gross, C. Kruegel, K. Almeroth, A. Moser, and E. Kirda. FIRE: FInding Rogue nEtworks. In Proc. of 25th ACSAC, 2009.
-
(2009)
Proc. of 25th ACSAC
-
-
Stone-Gross, B.1
Kruegel, C.2
Almeroth, K.3
Moser, A.4
Kirda, E.5
-
53
-
-
35348904515
-
Spam double-funnel: Connecting web spammers with advertisers
-
Y.-M. Wang, M. Ma, Y. Niu, and H. Chen. Spam Double-Funnel: Connecting Web Spammers with Advertisers. In Proc. of 16th WWW, 2007.
-
(2007)
Proc. of 16th WWW
-
-
Wang, Y.-M.1
Ma, M.2
Niu, Y.3
Chen, H.4
-
56
-
-
58449122201
-
Spamming botnets: Signatures and characteristics
-
Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov. Spamming Botnets: Signatures and Characteristics. In Proc. of ACM SIGCOMM, 2008.
-
(2008)
Proc. of ACM SIGCOMM
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
-
57
-
-
12744250266
-
An evaluation of statistical spam filtering techniques
-
L. Zhang, J. Zhu, and T. Yao. An Evaluation of Statistical Spam Filtering Techniques. ACM Trans. on ALIP, 3(4), 2004.
-
(2004)
ACM Trans. on ALIP
, vol.3
, Issue.4
-
-
Zhang, L.1
Zhu, J.2
Yao, T.3
-
58
-
-
79954733367
-
BotGraph: Large-scale spamming botnet detection
-
Y. Zhao, Y. Xie, F. Yu, Q. Ke, Y. Yu, Y. Chen, and E. Gillum. BotGraph: Large-Scale Spamming Botnet Detection. In Proc. of 6th NSDI, 2009.
-
(2009)
Proc. of 6th NSDI
-
-
Zhao, Y.1
Xie, Y.2
Yu, F.3
Ke, Q.4
Yu, Y.5
Chen, Y.6
Gillum, E.7
-
59
-
-
77950621688
-
Studying malicious websites and the underground economy on the Chinese web
-
J. Zhuge, T. Holz, C. Song, J. Guo, X. Han, and W. Zou. Studying Malicious Websites and the Underground Economy on the Chinese Web. In Proc. of 7th WEIS, 2008.
-
(2008)
Proc. of 7th WEIS
-
-
Zhuge, J.1
Holz, T.2
Song, C.3
Guo, J.4
Han, X.5
Zou, W.6
|