-
1
-
-
19544387615
-
An analysis of internet chat systems
-
Proceedings of the 2003 ACM SIGCOMM Internet Measurement Conference, IMC 2003
-
C. Dewes, A. Wichmann, and A. Feldmann, "An analysis of Internet chat systems," in Proc. ACM SIGCOMM IMC, Miami, FL, Oct. 2003, pp. 51-64. (Pubitemid 40730639)
-
(2003)
Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC
, pp. 51-64
-
-
Dewes, C.1
Wichmann, A.2
Feldmann, A.3
-
2
-
-
80054110172
-
AOL spam petitions cut both ways
-
Dec. 22 [Online]
-
J. Hu, "AOL spam petitions cut both ways," CNET News Dec. 22, 2010 [Online]. Available: http://news.cnet.com/AOL-spam-petitionscut-both-ways/ 2100-1024-3-1015385.html
-
(2010)
CNET News
-
-
Hu, J.1
-
3
-
-
79952690149
-
Yahoo! Messenger network overrun by bots
-
Dec. 18 [Online]
-
B. Krebs, "Yahoo! Messenger network overrun by bots," Washington Post Dec. 18, 2007 [Online]. Available: http://blog.washingtonpost. com/securityfix/2007/08/yahoo-messenger-network-overru.html
-
(2007)
Washington Post
-
-
Krebs, B.1
-
4
-
-
80054118569
-
Yahoo Chat: CAPTCHA check to remove bots
-
Dec. 18 [Online]
-
A. Mohta, "Yahoo Chat: CAPTCHA check to remove bots," Technospot.Net Dec. 18, 2007 [Online]. Available: http://www. technospot.net/blogs/yahoo-chat-captcha-check-to-remove-bots/
-
(2007)
Technospot.Net
-
-
Mohta, A.1
-
5
-
-
80054111206
-
Bots are back in Yahoo chat rooms
-
Dec. 18 [Online]
-
A. Mohta, "Bots are back in Yahoo chat rooms," Technospot.Net Dec. 18, 2007 [Online]. Available: http://www.technospot.net/blogs/botsare-back- in-yahoo-chat-room/
-
(2007)
Technospot.Net
-
-
Mohta, A.1
-
6
-
-
80054118362
-
Should cyberspace chat rooms be closed to protect children?
-
V. Hinze-Hoare, "Should cyberspace chat rooms be closed to protect children?," Comput. Res. Repository, 2004.
-
(2004)
Comput. Res. Repository
-
-
Hinze-Hoare, V.1
-
7
-
-
67650851265
-
Reducing the attack surface in massively multiplayer online role-playing games
-
May-Jun.
-
S. Bono, D. Caselden, G. Landau, and C. Miller, "Reducing the attack surface in massively multiplayer online role-playing games," IEEE Security Privacy, vol. 7, no. 3, pp. 13-19, May-Jun. 2009.
-
(2009)
IEEE Security Privacy
, vol.7
, Issue.3
, pp. 13-19
-
-
Bono, S.1
Caselden, D.2
Landau, G.3
Miller, C.4
-
8
-
-
80054104718
-
-
Yahelite.org Jan. 8 [Online]
-
"YahElite chat client," Yahelite.org, Jan. 8, 2008 [Online]. Available: http://www.yahelite.org/
-
(2008)
YahElite Chat Client
-
-
-
9
-
-
35248831179
-
CAPTCHA: Using hard AI problems for security
-
Warsaw, Poland, May
-
L. V. Ahn, M. Blum, N. Hopper, and J. Langford, "CAPTCHA: Using hard AI problems for security," in Proc. Eurocrypt, Warsaw, Poland, May 2003, pp. 294-311.
-
(2003)
Proc. Eurocrypt
, pp. 294-311
-
-
Ahn, L.V.1
Blum, M.2
Hopper, N.3
Langford, J.4
-
10
-
-
33747653575
-
A study of internet instant messaging and chat protocols
-
DOI 10.1109/MNET.2006.1668399
-
R. B. Jennings, III, E. M. Nahum, D. P. Olshefski, D. Saha, Z.-Y. Shae, and C. Waters, "A study of internet instant messaging and chat protocols," IEEE Netw., vol. 20, no. 4, pp. 16-21, Jul.-Aug. 2006. (Pubitemid 44270226)
-
(2006)
IEEE Network
, vol.20
, Issue.4
, pp. 16-21
-
-
Jennings III, R.B.1
Nahum, E.M.2
Olshefski, D.P.3
Saha, D.4
Shae, Z.-Y.5
Waters, C.6
-
11
-
-
80054111389
-
Yahoo closes chat rooms over child sex concerns
-
Jan. 27 [Online]
-
E. Mills, "Yahoo closes chat rooms over child sex concerns," CNET News Jan. 27, 2008 [Online]. Available: http://news.cnet.com/2100-1025-3- 5759705.html
-
(2008)
CNET News
-
-
Mills, E.1
-
12
-
-
33749064633
-
Detecting and filtering instant messaging spam - A global and personalized approach
-
DOI 10.1109/NPSEC.2005.1532048, 1532048, 2005 First Workshop on Secure Network Protocols, NPSec, held in conjunction with ICNP 2005: 13th IEEE International Conference on Network Protocols
-
Z. Liu, W. Lin, N. Li, and D. Lee, "Detecting and filtering instant messaging spam-a global and personalized approach," in Proc. NPSEC, Boston, MA, Nov. 2005, pp. 19-24. (Pubitemid 44461870)
-
(2005)
2005 First Workshop on Secure Network Protocols, NPSec, held in conjunction with ICNP 2005: 13th IEEE International Conference on Network Protocols
, vol.2005
, pp. 19-24
-
-
Liu, Z.1
Lin, W.2
Li, N.3
Lee, D.4
-
13
-
-
31844456208
-
On instant messaging worms, analysis and countermeasures
-
DOI 10.1145/1103626.1103629, WORM'05 - Proceedings of the 2005 ACM Workshop on Rapid Malcode
-
M. Mannan and P. C. van Oorschot, "On instant messaging worms, analysis and countermeasures," in Proc. ACM WORM, Fairfax, VA, Nov. 2005, pp. 2-11. (Pubitemid 43183505)
-
(2005)
WORM'05 - Proceedings of the 2005 ACM Workshop on Rapid Malcode
, pp. 2-11
-
-
Mannan, M.1
Van Oorschot, P.C.2
-
14
-
-
48649108112
-
HoneyIM: Fast detection and suppression of instant messaging malware in enterprise-like networks
-
Miami Beach, FL, Dec.
-
M. Xie, Z. Wu, and H. Wang, "HoneyIM: Fast detection and suppression of instant messaging malware in enterprise-like networks," in Proc. ACSAC, Miami Beach, FL, Dec. 2007, pp. 64-73.
-
(2007)
Proc. ACSAC
, pp. 64-73
-
-
Xie, M.1
Wu, Z.2
Wang, H.3
-
15
-
-
48649093663
-
Analyzing network and content characteristics of spim using honeypots
-
Santa Clara, CA, Jun.
-
A. J. Trivedi, P. Q. Judge, and S. Krasser, "Analyzing network and content characteristics of spim using honeypots," presented at the USENIX SRUTI, Santa Clara, CA, Jun. 2007.
-
(2007)
Usenix Shruti
-
-
Trivedi, A.J.1
Judge, P.Q.2
Krasser, S.3
-
16
-
-
78349246329
-
Devious chatbots-Interactive malware with a plot
-
P. J. Y. Jonathan, C. C. Fung, and K. W.Wong, "Devious chatbots-Interactive malware with a plot," Commun. Comput. Inf. Sci., vol. 44, pp. 110-118, 2009.
-
(2009)
Commun. Comput. Inf. Sci.
, vol.44
, pp. 110-118
-
-
Jonathan, P.J.Y.1
Fung, C.C.2
Wong, K.W.3
-
17
-
-
57849085977
-
Rishi: Identify bot contaminated hosts by IRC nickname evaluation
-
Cambridge, MA, Apr.
-
J. Goebel and T. Holz, "Rishi: Identify bot contaminated hosts by IRC nickname evaluation," presented at the USENIX HotBots, Cambridge, MA, Apr. 2007.
-
(2007)
USENIX HotBots
-
-
Goebel, J.1
Holz, T.2
-
18
-
-
48649089769
-
A taxonomy of botnet structures
-
Miami, FL, Dec.
-
D. Dagon, G. Gu, C. P. Lee, and W. Lee, "A taxonomy of botnet structures," in Proc. ACSAC, Miami, FL, Dec. 2007, pp. 325-339.
-
(2007)
Proc. ACSAC
, pp. 325-339
-
-
Dagon, D.1
Gu, G.2
Lee, C.P.3
Lee, W.4
-
19
-
-
85061529860
-
Bothunter: Detecting malware infection through IDS-driven dialog correlation
-
Boston, MA, Aug.
-
G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee, "Bothunter: Detecting malware infection through IDS-driven dialog correlation," in Proc. USENIX Security, Boston, MA, Aug. 2007, pp. 167-182.
-
(2007)
Proc. USENIX Security
, pp. 167-182
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
20
-
-
85175133385
-
Botsniffer: Detecting botnet command and control channels in network traffic
-
San Diego, CA, Feb.
-
G. Gu, J. Zhang, and W. Lee, "Botsniffer: Detecting botnet command and control channels in network traffic," presented at the NDSS, San Diego, CA, Feb. 2008.
-
(2008)
NDSS
-
-
Gu, G.1
Zhang, J.2
Lee, W.3
-
21
-
-
48649084321
-
Botnet tracking: Tools, techniques, and lessons learned
-
Washington, DC, Feb.-Mar.
-
J. Nazario, "Botnet tracking: Tools, techniques, and lessons learned," presented at the BlackHat, Washington, DC, Feb.-Mar. 2007.
-
(2007)
BlackHat
-
-
Nazario, J.1
-
22
-
-
77952351261
-
Towards complete node enumeration in a peer-to-peer botnet
-
Sydney, Australia
-
B. B. Kang, E. Chan-Tin, C. P. Lee, J. Tyra, H. J. Kang, C. Nunnery, Z. Wadler, G. Sinclair, N. Hopper, D. Dagon, and Y. Kim, "Towards complete node enumeration in a peer-to-peer botnet," in Proc. ASIACCS, Sydney, Australia, 2009, pp. 23-34.
-
(2009)
Proc. ASIACCS
, pp. 23-34
-
-
Kang, B.B.1
Chan-Tin, E.2
Lee, C.P.3
Tyra, J.4
Kang, H.J.5
Nunnery, C.6
Wadler, Z.7
Sinclair, G.8
Hopper, N.9
Dagon, D.10
Kim, Y.11
-
23
-
-
85059753615
-
Botgrep: Findingp P2P bots with structured graph analysis
-
Washington, DC, Aug.
-
S. Nagaraja, P. Mittal, C.-Y. Hong, M. Caesar, and N. Borisov, "Botgrep: Findingp P2P bots with structured graph analysis," in Proc. USENIX Security Symp., Washington, DC, Aug. 2010, p. 2.
-
(2010)
Proc. USENIX Security Symp.
, pp. 2
-
-
Nagaraja, S.1
Mittal, P.2
Hong, C.-Y.3
Caesar, M.4
Borisov, N.5
-
24
-
-
11244335124
-
Sparse binary polynomial hashing and the CRM114 discriminator
-
Cambridge, MA, Jan.
-
W. Yerazunis, "Sparse binary polynomial hashing and the CRM114 discriminator," presented at the MIT Spam Conf., Cambridge, MA, Jan. 2003.
-
(2003)
MIT Spam Conf.
-
-
Yerazunis, W.1
-
25
-
-
79952052472
-
Scalable centralized Bayesian spam mitigation with bogofilter
-
Atlanta, GA, Nov.
-
J. Blosser and D. Josephsen, "Scalable centralized Bayesian spam mitigation with bogofilter," in Proc. USENIX LISA, Atlanta, GA, Nov. 2004, pp. 1-20.
-
(2004)
Proc. USENIX LISA
, pp. 1-20
-
-
Blosser, J.1
Josephsen, D.2
-
27
-
-
33750374263
-
Fast statistical spam filter by approximate classifications
-
DOI 10.1145/1140103.1140317, SIGMETRICS 2006/Performance 2006 - Joint International Conference on Measurement and Modeling of Computer Systems, Proceedings
-
K. Li and Z. Zhong, "Fast statistical spam filter by approximate classifications," in Proc. ACM SIGMETRICS, St. Malo, France, Jun. 2006, pp. 347-358. (Pubitemid 44619104)
-
(2006)
Performance Evaluation Review
, vol.34
, Issue.1
, pp. 347-358
-
-
Li, K.1
Zhong, Z.2
-
28
-
-
33947663308
-
On attacking statistical spam filters
-
CA, Jul.
-
G. L. Wittel and S. F. Wu, "On attacking statistical spam filters," presented at the CEAS, Mountain View, CA, Jul. 2004.
-
(2004)
CEAS Mountain View
-
-
Wittel, G.L.1
Wu, S.F.2
-
29
-
-
65449142381
-
Good word attacks on statistical spam filters
-
CA, Jul.
-
D. Lowd and C. Meek, "Good word attacks on statistical spam filters," presented at the CEAS, Mountain View, CA, Jul. 2005.
-
(2005)
CEAS Mountain View
-
-
Lowd, D.1
Meek, C.2
-
30
-
-
85084161850
-
Exploiting redundancy in natural language to penetrate Bayesian spam filters
-
Boston, MA, Aug.
-
C. Karlberger, G. Bayler, C. Kruegel, and E. Kirda, "Exploiting redundancy in natural language to penetrate Bayesian spam filters," presented at the USENIX WOOT, Boston, MA, Aug. 2007.
-
(2007)
USENIX WOOT
-
-
Karlberger, C.1
Bayler, G.2
Kruegel, C.3
Kirda, E.4
-
31
-
-
80054098856
-
New entry process for chat rooms
-
Aug. 29 [Online]
-
S. Bacon, "New entry process for chat rooms," Yahoo! Messenger Blog Aug. 29, 2007 [Online]. Available: http://www.ymessengerblog.com/blog/2007/ 08/29/new-entry-process-for-chat-rooms/
-
(2007)
Yahoo! Messenger Blog
-
-
Bacon, S.1
-
32
-
-
80054121657
-
Chat rooms follow-up
-
Aug. 21 [Online]
-
S. Bacon, "Chat rooms follow-up," Yahoo! Messenger Blog Aug. 21, 2007 [Online]. Available: http://www.ymessengerblog.com/blog/2007/08/21/ chat-rooms-follow-up/
-
(2007)
Yahoo! Messenger Blog
-
-
Bacon, S.1
-
33
-
-
80054113867
-
Chat rooms update
-
Aug. 24 [Online]
-
S. Bacon, "Chat rooms update," Yahoo! Messenger Blog Aug. 24, 2007 [Online]. Available: http://www.ymessengerblog.com/blog/2007/08/24/chat- rooms-update-2/
-
(2007)
Yahoo! Messenger Blog
-
-
Bacon, S.1
-
34
-
-
0002988210
-
Computing machinery and intelligence
-
A. M. Turing, "Computing machinery and intelligence," Mind, vol. 59, pp. 433-460, 1950.
-
(1950)
Mind
, vol.59
, pp. 433-460
-
-
Turing, A.M.1
-
35
-
-
60349099619
-
Turing's imitation game: Still an impossible challenge for all machines and some judges-An evaluation of the 2008 Loebner contest
-
L. Floridi, M. Taddeo, and M. Turilli, "Turing's imitation game: Still an impossible challenge for all machines and some judges-An evaluation of the 2008 Loebner contest," Minds Mach., vol. 19, no. 1, pp. 145-150, 2009.
-
(2009)
Minds Mach.
, vol.19
, Issue.1
, pp. 145-150
-
-
Floridi, L.1
Taddeo, M.2
Turilli, M.3
-
36
-
-
80054106703
-
-
Symantec, Mountain View, CA, Jan. 25 [Online]
-
"Symantec security response, W32.Imaut.AS worm," Symantec, Mountain View, CA, Jan. 25, 2008 [Online]. Available: http://www. symantec.com/security-response/writeup.jsp?docid=2007-080114-2713-99
-
(2008)
Symantec Security Response, W32.Imaut.AS Worm
-
-
-
37
-
-
80054117252
-
-
Uber-Geek.com, Jan. 18 [Online]
-
"Yahoo! responder bot," Uber-Geek.com, Jan. 18, 2008 [Online]. Available: http://www.uber-geek.com/bot.shtml
-
(2008)
Yahoo! Responder Bot
-
-
-
38
-
-
0031611375
-
Measuring regularity by means of a corrected conditional entropy in sympathetic outflow
-
A. Porta, G. Baselli, D. Liberati, N. Montano, C. Cogliati, T. Gnecchi-Ruscone, A. Malliani, and S. Cerutti, "Measuring regularity by means of a corrected conditional entropy in sympathetic outflow," Biol. Cybernet., vol. 78, no. 1, pp. 71-78, Jan. 1998. (Pubitemid 128636376)
-
(1998)
Biological Cybernetics
, vol.78
, Issue.1
, pp. 71-78
-
-
Porta, A.1
Baselli, G.2
Liberati, D.3
Montano, N.4
Cogliati, C.5
Gnecchi-Ruscone, T.6
Malliani, A.7
Cerutti, S.8
-
39
-
-
0041306381
-
-
Ph.D. dissertation, Dept. Comput. Inf. Syst., Univ. Paisley, Paisley, U.K.
-
R. Rosipal, "Kernel-based regression and objective nonlinear measures to assess brain functioning," Ph.D. dissertation, Dept. Comput. Inf. Syst., Univ. Paisley, Paisley, U.K., 2001.
-
(2001)
Kernel-based Regression and Objective Nonlinear Measures to Assess Brain Functioning
-
-
Rosipal, R.1
-
40
-
-
77952331178
-
Detecting covert timing channels: An entropy-based approach
-
Alexandria, VA, Oct.
-
S. Gianvecchio and H. Wang, "Detecting covert timing channels: An entropy-based approach," in Proc. ACM CCS, Alexandria, VA, Oct. 2007, pp. 307-316.
-
(2007)
Proc. ACM CCS
, pp. 307-316
-
-
Gianvecchio, S.1
Wang, H.2
-
41
-
-
0002442796
-
Machine learning in automated text categorization
-
F. Sebastiani, "Machine learning in automated text categorization," ACM Comput. Surveys, vol. 34, no. 1, pp. 1-47, 2002.
-
(2002)
ACM Comput. Surveys
, vol.34
, Issue.1
, pp. 1-47
-
-
Sebastiani, F.1
-
42
-
-
33845905176
-
Adaptive spam filtering using dynamic feature space
-
DOI 10.1109/ICTAI.2005.28, 1562953, ICTAI 2005: 17th IEEE International Conference on Tools with Artificial Intelligence, ICTAI'05
-
Y. Zhou, M. S. Mulekar, and P. Nerellapalli, "Adaptive spam filtering using dynamic feature space," in Proc. Int. Conf. Tools Artif. Intell., Hong Kong, China, Nov. 2005, pp. 302-309. (Pubitemid 46016435)
-
(2005)
Proceedings - International Conference on Tools with Artificial Intelligence, ICTAI
, vol.2005
, pp. 302-309
-
-
Zhou, Y.1
Mulekar, M.S.2
Nerellapalli, P.3
-
43
-
-
79958746877
-
Honeybot, your man in the middle for automated social engineering
-
Apr.
-
T. Lauinger, V. Pankakoski, and E. Kirda, "Honeybot, your man in the middle for automated social engineering," presented at the USENIX LEET, Apr. 2010.
-
(2010)
USENIX LEET
-
-
Lauinger, T.1
Pankakoski, V.2
Kirda, E.3
|