-
1
-
-
80755127636
-
-
Google Web Search API. https://code.google.com/apis/websearch/.
-
-
-
-
2
-
-
85084096558
-
The nocebo effect on the web: An analysis of fake anti-virus distribution
-
San Jose, CA, April
-
M. Abu Rajab, L. Ballard, P. Mavrommatis, N. Provos, and X. Zhao. The nocebo effect on the web: an analysis of fake anti-virus distribution. In Proc. USENIX LEET'10, San Jose, CA, April 2010.
-
(2010)
Proc. USENIX LEET'10
-
-
Abu Rajab, M.1
Ballard, L.2
Mavrommatis, P.3
Provos, N.4
Zhao, X.5
-
3
-
-
80755159984
-
-
AdBlock
-
AdBlock. Adblock easy list. https://easylist-downloads.adblockplus.org/ easylist.txt.
-
Adblock Easy List
-
-
-
5
-
-
84964572278
-
It's all about the benjamins: Incentivizing users to ignore security advice
-
St. Lucia, Feb.
-
N. Christin, S. Egelman, T. Vidas, and J. Grossklags. It's all about the Benjamins: Incentivizing users to ignore security advice. In Proc. Financial Crypto.'11, St. Lucia, Feb. 2011.
-
(2011)
Proc. Financial Crypto.'11
-
-
Christin, N.1
Egelman, S.2
Vidas, T.3
Grossklags, J.4
-
6
-
-
78650002261
-
Dissecting one click frauds
-
Chicago, IL, Oct.
-
N. Christin, S. Yanagihara, and K. Kamataki. Dissecting one click frauds. In Proc. ACM CCS'10, pages 15-26, Chicago, IL, Oct. 2010.
-
(2010)
Proc. ACM CCS'10
, pp. 15-26
-
-
Christin, N.1
Yanagihara, S.2
Kamataki, K.3
-
7
-
-
34249832377
-
A bayesian method for the induction of probabilistic networks from data
-
G. Cooper and E. Herskovits. A Bayesian method for the induction of probabilistic networks from data. Machine Learning, 9(4):309-347, 1992.
-
(1992)
Machine Learning
, vol.9
, Issue.4
, pp. 309-347
-
-
Cooper, G.1
Herskovits, E.2
-
8
-
-
79958723522
-
An analysis of rogue AV campaigns
-
Ottawa, ON, Canada, September
-
M. Cova, C. Leita, O. Thonnard, A. Keromytis, and M. Dacier. An analysis of rogue AV campaigns. In Proc. RAID 2010, Ottawa, ON, Canada, September 2010.
-
(2010)
Proc. RAID 2010
-
-
Cova, M.1
Leita, C.2
Thonnard, O.3
Keromytis, A.4
Dacier, M.5
-
9
-
-
77952415099
-
An inquiry into the nature and causes of the wealth of internet miscreants
-
Alexandria, VA, October
-
J. Franklin, V. Paxson, A. Perrig, and S. Savage. An inquiry into the nature and causes of the wealth of internet miscreants. In Proc. ACM CCS'07, pages 375-388, Alexandria, VA, October 2007.
-
(2007)
Proc. ACM CCS'07
, pp. 375-388
-
-
Franklin, J.1
Paxson, V.2
Perrig, A.3
Savage, S.4
-
10
-
-
78650005374
-
Spam: The underground in 140 characters or less
-
Chicago, IL, October
-
C. Grier, K. Thomas, V. Paxson, and M. Zhang. @spam: The underground in 140 characters or less. In Proc. ACM CCS'10, pages 27-37, Chicago, IL, October 2010.
-
(2010)
Proc. ACM CCS'10
, pp. 27-37
-
-
Grier, C.1
Thomas, K.2
Paxson, V.3
Zhang, M.4
-
14
-
-
80755173009
-
-
Google Inc. Google traffic estimator. https://adwords.google.com/select/ TrafficEstimatorSandbox.
-
Google Traffic Estimator
-
-
-
15
-
-
78651468316
-
-
Google Inc. Google trends. http://www.google.com/trends/.
-
Google Trends
-
-
-
16
-
-
84885665252
-
Accurately interpreting clickthrough data as implicit feedback
-
Salvador, Brazil, Aug.
-
T. Joachims, L. Granka, B. Pang, H. Hembrooke, and G. Gay. Accurately interpreting clickthrough data as implicit feedback. In Proc. ACM SIGIR'05, pages 154-161, Salvador, Brazil, Aug. 2005.
-
(2005)
Proc. ACM SIGIR'05
, pp. 154-161
-
-
Joachims, T.1
Granka, L.2
Pang, B.3
Hembrooke, H.4
Gay, G.5
-
17
-
-
85076487784
-
DeSEO: Combating search-result poisoning
-
San Francisco, CA, August
-
J. John, F. Yu, Y. Xie, M. Abadi, and A. Krishnamurthy. deSEO: Combating search-result poisoning. In Proc. USENIX Security'11, San Francisco, CA, August 2011.
-
(2011)
Proc. USENIX Security'11
-
-
John, J.1
Yu, F.2
Xie, Y.3
Abadi, M.4
Krishnamurthy, A.5
-
18
-
-
70349272437
-
Spamalytics: An empirical analysis of spam marketing conversion
-
Alexandria, VA, Oct.
-
C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage. Spamalytics: An empirical analysis of spam marketing conversion. In Proc. ACM CCS'08, pages 3-14, Alexandria, VA, Oct. 2008.
-
(2008)
Proc. ACM CCS'08
, pp. 3-14
-
-
Kanich, C.1
Kreibich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.5
Paxson, V.6
Savage, S.7
-
19
-
-
0001122762
-
A study of cross-validation and bootstrap for accuracy estimation and model selection
-
Montreal, QC, Canada, Aug.
-
R. Kohavi. A study of cross-validation and bootstrap for accuracy estimation and model selection. In Proc. IJCAI'95, pages 1137-1145, Montreal, QC, Canada, Aug. 1995.
-
(1995)
Proc. IJCAI'95
, pp. 1137-1145
-
-
Kohavi, R.1
-
20
-
-
84888088814
-
Measuring and analyzing search-redirection attacks in the illicit online prescription drug trade
-
San Francisco, CA, August
-
N. Leontiadis, T. Moore, and N. Christin. Measuring and analyzing search-redirection attacks in the illicit online prescription drug trade. In Proc. USENIX Security'11, San Francisco, CA, August 2011.
-
(2011)
Proc. USENIX Security'11
-
-
Leontiadis, N.1
Moore, T.2
Christin, N.3
-
21
-
-
70849105401
-
Meme-tracking and the dynamics of the news cycle
-
Paris, France, June
-
J. Leskovec, L. Backstrom, and R. Kleinberg. Meme-tracking and the dynamics of the news cycle. In Proc. ACM KDD'09, Paris, France, June 2009.
-
(2009)
Proc. ACM KDD'09
-
-
Leskovec, J.1
Backstrom, L.2
Kleinberg, R.3
-
22
-
-
80051960199
-
Click trajectories: End-to-end analysis of the spam value chain
-
Oakland, CA, May
-
K. Levchenko, N. Chachra, B. Enright, M. Felegyhazi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, D. McCoy, A. Pitsillidis, N. Weaver, V. Paxson, G. Voelker, and S. Savage. Click trajectories: End-to-end analysis of the spam value chain. In Proc. IEEE Symp. Security & Privacy, pages 431-446, Oakland, CA, May 2011.
-
(2011)
Proc. IEEE Symp. Security & Privacy
, pp. 431-446
-
-
Levchenko, K.1
Chachra, N.2
Enright, B.3
Felegyhazi, M.4
Grier, C.5
Halvorson, T.6
Kanich, C.7
Kreibich, C.8
Liu, H.9
Mccoy, D.10
Pitsillidis, A.11
Weaver, N.12
Paxson, V.13
Voelker, G.14
Savage, S.15
-
25
-
-
51149115237
-
Examining the impact of website take-down on phishing
-
Pittsburgh, PA, October
-
T. Moore and R. Clayton. Examining the impact of website take-down on phishing. In Proc. APWG eCrime'07, Pittsburgh, PA, October 2007.
-
(2007)
Proc. APWG ECrime'07
-
-
Moore, T.1
Clayton, R.2
-
26
-
-
70350398962
-
Evil searching: Compromise and recompromise of internet hosts for phishing
-
Barbados, Feb.
-
T. Moore and R. Clayton. Evil searching: Compromise and recompromise of internet hosts for phishing. In Proc. Financial Crypto'09, pages 256-272, Barbados, Feb. 2009.
-
(2009)
Proc. Financial Crypto'09
, pp. 256-272
-
-
Moore, T.1
Clayton, R.2
-
27
-
-
85084095292
-
Temporal correlations between spam and phishing websites
-
Boston, MA, April
-
T. Moore, R. Clayton, and H. Stern. Temporal correlations between spam and phishing websites. In Proc. USENIX LEET'09, Boston, MA, April 2009.
-
(2009)
Proc. USENIX LEET'09
-
-
Moore, T.1
Clayton, R.2
Stern, H.3
-
28
-
-
77955318018
-
Measuring the perpetrators and funders of typosquatting
-
Tenerife, Spain, Jan.
-
T. Moore and B. Edelman. Measuring the perpetrators and funders of typosquatting. In Proc. Financial Crypto.'10, pages 175-191, Tenerife, Spain, Jan. 2010.
-
(2010)
Proc. Financial Crypto.'10
, pp. 175-191
-
-
Moore, T.1
Edelman, B.2
-
29
-
-
51249104199
-
Bayesian networks: A model of self-activated memory for evidential reasoning
-
Irvine, CA, Aug.
-
J. Pearl. Bayesian Networks: A Model of Self-Activated Memory for Evidential Reasoning. In Proc. 7th Conf. of the Cognitive Science Society, pages 329-334, Irvine, CA, Aug. 1985.
-
(1985)
Proc. 7th Conf. of the Cognitive Science Society
, pp. 329-334
-
-
Pearl, J.1
-
30
-
-
80053650188
-
All your iFrames point to us
-
San Jose, CA, August
-
N. Provos, P. Mavrommatis, M. Abu Rajab, and F. Monrose. All your iFrames point to us. In Proc. USENIX Security'08, San Jose, CA, August 2008.
-
(2008)
Proc. USENIX Security'08
-
-
Provos, N.1
Mavrommatis, P.2
Abu Rajab, M.3
Monrose, F.4
-
31
-
-
85080711655
-
The ghost in the browser: Analysis of web-based malware
-
Cambridge, MA, April
-
N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. Modadugu. The ghost in the browser: Analysis of web-based malware. In Proc. USENIX HotBots'07, Cambridge, MA, April 2007.
-
(2007)
Proc. USENIX HotBots'07
-
-
Provos, N.1
Mcnamee, D.2
Mavrommatis, P.3
Wang, K.4
Modadugu, N.5
-
33
-
-
80755127628
-
-
November Article appeared in print on November 28, 2010, on page BU1 of the New York edition
-
D. Segal. A bully finds a pulpit on the web. New York Times, November 2010. Article appeared in print on November 28, 2010, on page BU1 of the New York edition. Available online at http://www.nytimes.com/2010/11/28/business/ 28borker.html.
-
(2010)
A Bully Finds a Pulpit on the Web
-
-
Segal, D.1
-
34
-
-
80755173003
-
-
February Article appeared in print on February 13, 2011, on page BU1 of the New York edition
-
D. Segal. The dirty little secrets of search. New York Times, February 2011. Article appeared in print on February 13, 2011, on page BU1 of the New York edition. Available online at http://www.nytimes.com/2011/02/13/business/ 13search.html.
-
(2011)
The Dirty Little Secrets of Search
-
-
Segal, D.1
-
36
-
-
84869407868
-
The underground economy of fake antivirus software
-
Fairfax, VA, June
-
B. Stone-Gross, R. Abman, R. Kemmerer, C. Kruegel, D. Steigerwald, and G. Vigna. The underground economy of fake antivirus software. In Proc. (online) WEIS 2011, Fairfax, VA, June 2011.
-
(2011)
Proc. (online) WEIS 2011
-
-
Stone-Gross, B.1
Abman, R.2
Kemmerer, R.3
Kruegel, C.4
Steigerwald, D.5
Vigna, G.6
-
38
-
-
80755159982
-
-
Yahoo! Inc. Yahoo buzzlog. http://buzzlog.yahoo.com/overall/.
-
-
-
-
39
-
-
80755173001
-
-
Yahoo! Inc. Yahoo site explorer. http://siteexplorer.search.yahoo.com/.
-
-
-
|