-
1
-
-
84949626334
-
Spamscatter: Characterizing internet scam hosting infrastructure
-
D. Anderson, C. Fleizach, S. Savage, and G. Voelker. Spamscatter: Characterizing Internet Scam Hosting Infrastructure. In Proceedings of the 16th USENIX Security Symposium, pages 135-148, 2007.
-
(2007)
Proceedings of the 16th USENIX Security Symposium
, pp. 135-148
-
-
Anderson, D.1
Fleizach, C.2
Savage, S.3
Voelker, G.4
-
5
-
-
84878681501
-
Geographic locality of IP prefixes
-
13
-
M. Freedman, M. Vutukuru, N. Feamster, and H. Balakrishnan. Geographic Locality of IP Prefixes. In Proceedings of the 5th ACM SIGCOMM IMC Conference on Internet Measurement, pages 13-13, 2005.
-
(2005)
Proceedings of the 5th ACM SIGCOMM IMC Conference on Internet Measurement
, pp. 13
-
-
Freedman, M.1
Vutukuru, M.2
Feamster, N.3
Balakrishnan, H.4
-
6
-
-
0002432565
-
Multivariate adaptive regression splines
-
J. Friedman. Multivariate Adaptive Regression Splines. Annals of Statistics, 19(1), 1991.
-
(1991)
Annals of Statistics
, vol.19
, Issue.1
-
-
Friedman, J.1
-
7
-
-
0003410290
-
-
Princeton University Press, illustrated edition
-
J. Hamilton. Time series analysis. Princeton University Press, illustrated edition, 1994.
-
(1994)
Time Series Analysis
-
-
Hamilton, J.1
-
9
-
-
27544460278
-
Remote physical device fingerprinting
-
Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
-
T. Kohno, A. Broido, and K. Claffy. Remote Physical Device Fingerprinting. In Proceedings of the 26th IEEE S&P Symposium on Security and Privacy, pages 211-225, 2005. An extended version appeared in the IEEE Transactions on Dependable and Secure Computing, 2(2):93-108, 2005. (Pubitemid 41543657)
-
(2005)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 211-225
-
-
Kohno, T.1
Broido, A.2
Claffy, K.3
-
10
-
-
35348835502
-
Detectives: Detecting coalition hit inflation attacks in advertising networks streams
-
DOI 10.1145/1242572.1242606, 16th International World Wide Web Conference, WWW2007
-
A. Metwally, D. Agrawal, and A. El Abbadi. DETECTIVES: DETEcting Coalition hiT Inflation attacks in adVertising nEtworks Streams. In Proceedings of the 16th WWW International World Wide Web Conference, pages 241-250, 2007. (Pubitemid 47582254)
-
(2007)
16th International World Wide Web Conference, WWW2007
, pp. 241-250
-
-
Metwally, A.1
Agrawal, D.2
El Abbadi, A.3
-
11
-
-
80051546602
-
SLEUTH: Single-pubLisher attack dEtection Using correlaTion Hunting
-
A. Metwally, F. Emeķci, D. Agrawal, and A. El Abbadi. SLEUTH: Single-pubLisher attack dEtection Using correlaTion Hunting. Proceedings of the VLDB Endowment, 1(2):1217-1228, 2008.
-
(2008)
Proceedings of the VLDB Endowment
, vol.1
, Issue.2
, pp. 1217-1228
-
-
Metwally, A.1
Emeķci, F.2
Agrawal, D.3
El Abbadi, A.4
-
12
-
-
34547339276
-
Hot or not: Revealing hidden services by their clock skew
-
DOI 10.1145/1180405.1180410, 1180410, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
S. Murdoch. Hot or Not: Revealing Hidden Services by their Clock Skew. In Proceedings of the 13th ACM CCS conference on Computer and Communications Security, pages 27-36, 2006. (Pubitemid 47131353)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 27-36
-
-
Murdoch, S.J.1
-
14
-
-
30344452311
-
Interpreting the data: Parallel analysis with Sawzall
-
R. Pike, S. Dorward, R. Griesemer, and S. Quinlan. Interpreting the Data: Parallel Analysis with Sawzall. Scientific Programming, 13(4):277-298, 2005. (Pubitemid 43063583)
-
(2005)
Scientific Programming
, vol.13
, Issue.SPEC. ISS. 4
, pp. 277-298
-
-
Pike, R.1
Dorward, S.2
Griesemer, R.3
Quinlan, S.4
-
17
-
-
0018518780
-
Updating mean and variance estimates: An improved method
-
DOI 10.1145/359146.359153
-
D. West. Updating Mean and Variance Estimates: An Improved Method. Communications of the ACM, 22(9):532-535, 1979. (Pubitemid 10415709)
-
(1979)
Communications of the ACM
, vol.22
, Issue.9
, pp. 532-535
-
-
West, D.H.D.1
-
19
-
-
36949011812
-
How dynamic are IP addresses?
-
DOI 10.1145/1282380.1282415, ACM SIGCOMM 2007: Conference on Computer Communications
-
Y. Xie, F. Yu, K. Achan, E. Gillum, M. Goldszmidt, and T. Wobber. How Dynamic are IP Addresses? In Proceedings of the 22nd ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pages 301-312, 2007. (Pubitemid 350239793)
-
(2007)
ACM SIGCOMM 2007: Conference on Computer Communications
, pp. 301-312
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Gillum, E.4
Goldszmidt, M.5
Wobber, T.6
-
20
-
-
85084095135
-
Characterizing botnets from email spam records
-
L. Zhuang, J. Dunagan, D. Simon, H. Wang, and J. Tygar. Characterizing Botnets from Email Spam Records. In Proceedings of the 1st Usenix LEET Workshop on Large-Scale Exploits and Emergent Threats, pages 1-9, 2008.
-
(2008)
Proceedings of the 1st Usenix LEET Workshop on Large-Scale Exploits and Emergent Threats
, pp. 1-9
-
-
Zhuang, L.1
Dunagan, J.2
Simon, D.3
Wang, H.4
Tygar, J.5
|