-
1
-
-
85058835823
-
Mapping internet sensors with probe response attacks
-
Baltimore, MD, July
-
John Bethencourt, Jason Franklin, and Mary Vernon. Mapping Internet Sensors with Probe Response Attacks. In Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, July 2005.
-
(2005)
Proceedings of the 14th USENIX Security Symposium
-
-
Bethencourt, J.1
Franklin, J.2
Vernon, M.3
-
5
-
-
79958723522
-
An analysis of rogue AV campaigns
-
September
-
Marco Cova, Corrado Leita, Olivier Thonnard, Angelos Keromytis, and Marc Dacier. An Analysis of Rogue AV Campaigns. In Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID), September 2010.
-
(2010)
Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID)
-
-
Cova, M.1
Leita, C.2
Thonnard, O.3
Keromytis, A.4
Dacier, M.5
-
7
-
-
80755159964
-
-
Google Safe Browsing API. http://code.google.com/apis/safebrowsing/.
-
-
-
-
8
-
-
85076487784
-
DeSEO: Combating search-result poisoning
-
August
-
John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, and Martin Abadi. deSEO: Combating Search-Result Poisoning. In Proceedings of the 20th USENIX Security Symposium, August 2011.
-
(2011)
Proceedings of the 20th USENIX Security Symposium
-
-
John, J.P.1
Yu, F.2
Xie, Y.3
Krishnamurthy, A.4
Abadi, M.5
-
10
-
-
84888088814
-
Measuring and analyzing search-redirection attacks in the illicit online prescription drug trade
-
August
-
Nektarios Leontiadis, Tyler Moore, and Nicolas Christin. Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade. In Proceedings of the 20th USENIX Security Symposium, August 2011.
-
(2011)
Proceedings of the 20th USENIX Security Symposium
-
-
Leontiadis, N.1
Moore, T.2
Christin, N.3
-
11
-
-
80051960199
-
Click trajectories: End-to-end analysis of the spam value chain
-
Oakland, CA, May
-
Kirill Levchenko, Neha Chachra, Brandon Enright, Márk Félegyházi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Andreas Pitsillidis, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker, and Stefan Savage. Click Trajectories: End-to-End Analysis of the Spam Value Chain. In Proceedings of the IEEE Symposium and Security and Privacy, Oakland, CA, May 2011.
-
(2011)
Proceedings of the IEEE Symposium and Security and Privacy
-
-
Levchenko, K.1
Chachra, N.2
Enright, B.3
Félegyházi, M.4
Grier, C.5
Halvorson, T.6
Kanich, C.7
Kreibich, C.8
He, L.9
Mccoy, D.10
Pitsillidis, A.11
Weaver, N.12
Paxson, V.13
Voelker, G.M.14
Savage, S.15
-
12
-
-
60349123688
-
Detection of cloaked web spam by using tag-based methods
-
Jun-Lin Lin. Detection of cloaked web spam by using tag-based methods. Expert Systems with Applications, 36(4):7493-7499, 2009.
-
(2009)
Expert Systems with Applications
, vol.36
, Issue.4
, pp. 7493-7499
-
-
Lin, J.-L.1
-
14
-
-
84893520306
-
A quantitative study of forum spamming using contextbased analysis
-
February
-
Yuan Niu, Yi-Min Wang, Hao Chen, Ming Ma, and Francis Hsu. A Quantitative Study of Forum Spamming Using Contextbased Analysis. In Proceedings of 15th Network and Distributed System Security (NDSS) Symposium, February 2007.
-
(2007)
Proceedings of 15th Network and Distributed System Security (NDSS) Symposium
-
-
Niu, Y.1
Wang, Y.-M.2
Hao, C.3
Ma, M.4
Hsu, F.5
-
15
-
-
85084096558
-
The nocebo effect on the web: An analysis of fake anti-virus distribution
-
April
-
Moheeb Abu Rajab, Lucas Ballard, Panayiotis Mavrommatis, Niels Provos, and Xin Zhao. The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution. In Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'10), April 2010.
-
(2010)
Proceedings of the 3rd USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET'10)
-
-
Rajab, M.A.1
Ballard, L.2
Mavrommatis, P.3
Provos, N.4
Xin, Z.5
-
16
-
-
80755127583
-
-
State of Search Engine Marketing Report Says Industry to Grow from $14.6 Billion in 2009 to $16.6 Billion in 2010 March
-
Search Engine Marketing Professional Organization (SEMPO). State of Search Engine Marketing Report Says Industry to Grow from $14.6 Billion in 2009 to $16.6 Billion in 2010. http://www.sempo.org/news/03-25-10, March 2010.
-
(2010)
-
-
-
17
-
-
3042687811
-
Analysis of a very large web search engine query log
-
Craig Silverstein, Monika Henzinger, Hannes Marais, and Michael Moricz. Analysis of a Very Large Web Search Engine Query Log. ACM SIGIR Forum, 33(1):6-12, 1999.
-
(1999)
ACM SIGIR Forum
, vol.33
, Issue.1
, pp. 6-12
-
-
Silverstein, C.1
Henzinger, M.2
Marais, H.3
Moricz, M.4
-
22
-
-
35348904515
-
Spam double-funnel: Connecting web spammers with advertisers
-
DOI 10.1145/1242572.1242612, 16th International World Wide Web Conference, WWW2007
-
Yi-Min Wang, Ming Ma, Yuan Niu, and Hao Chen. Spam Double-Funnel: Connecting Web Spammers with Advertisers. In Proceedings of the 16th International World Wide Web Conference (WWW'07), pages 291-300, May 2007. (Pubitemid 47582259)
-
(2007)
16th International World Wide Web Conference, WWW2007
, pp. 291-300
-
-
Wang, Y.-M.1
Ma, M.2
Niu, Y.3
Chen, H.4
-
25
-
-
34250667999
-
Detecting semantic cloaking on the Web
-
DOI 10.1145/1135777.1135901, Proceedings of the 15th International Conference on World Wide Web
-
Baoning Wu and Brian D. Davison. Detecting Semantic Cloaking on the Web. In Proceedings of the 15th International World Wide Web Conference, pages 819-828, May 2006. (Pubitemid 46946677)
-
(2006)
Proceedings of the 15th International Conference on World Wide Web
, pp. 819-828
-
-
Wu, B.1
Davison, B.D.2
|