-
5
-
-
35348913802
-
Dynamics of Bid Optimization in Online Advertisement Auctions
-
C. Borgs, J. Chayes, O. Etesami, N. Immorlica, K. Jain, and M. Mahdian. Dynamics of Bid Optimization in Online Advertisement Auctions. In Proceedings of the International Conference on World Wide Web, 2007.
-
Proceedings of the International Conference on World Wide Web, 2007
-
-
Borgs, C.1
Chayes, J.2
Etesami, O.3
Immorlica, N.4
Jain, K.5
Mahdian, M.6
-
6
-
-
82955204969
-
Online Advertising Fraud
-
N. Daswani, C. Mysen, V. Rao, S. Weis, and S. G. K. Gharachorloo. Online Advertising Fraud. In Proceedings of Crimeware, 2008.
-
Proceedings of Crimeware, 2008
-
-
Daswani, N.1
Mysen, C.2
Rao, V.3
Weis, S.4
Gharachorloo, S.G.K.5
-
13
-
-
33744939995
-
Click Fraud Resistant Methods for Learning Click-Through Rates
-
N. Immorlica, K. Jain, M. Mahdian, and K. Talwar. Click Fraud Resistant Methods for Learning Click-Through Rates. Internet and Network Economics, pages 34-45, 2005.
-
(2005)
Internet and Network Economics
, pp. 34-45
-
-
Immorlica, N.1
Jain, K.2
Mahdian, M.3
Talwar, K.4
-
15
-
-
70349272437
-
Spamalytics: An Empirical Analysis of Spam Marketing Conversion
-
C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage. Spamalytics: An Empirical Analysis of Spam Marketing Conversion. In Proceedings of the ACM Conference on Computer and Communications Security, 2008.
-
Proceedings of the ACM Conference on Computer and Communications Security, 2008
-
-
Kanich, C.1
Kreibich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.5
Paxson, V.6
Savage, S.7
-
16
-
-
84894564658
-
The goals and challenges of click fraud penetration testing systems
-
C. Kintana, D. Turner, J. Pan, A. Metwally, N. Daswani, E. Chin, and A. Bortz. The goals and challenges of click fraud penetration testing systems. In In Proceedings of the International Symposium on Software Reliability Engineering, 2009.
-
Proceedings of the International Symposium on Software Reliability Engineering, 2009
-
-
Kintana, C.1
Turner, D.2
Pan, J.3
Metwally, A.4
Daswani, N.5
Chin, E.6
Bortz, A.7
-
21
-
-
82955238614
-
-
L. Rodriguez. http://www.washingtonpost.com/wp-srv/technology/documents/ yahoo-may2006.pdf, 2006.
-
(2006)
-
-
Rodriguez, L.1
-
22
-
-
77954925610
-
Walowdac âǍŞ Analysis of a Peer-to-Peer Botnet
-
B. Stock, J. Gobel, M. Engelberth, F. Freiling, and T. Holz. Walowdac âǍŞ Analysis of a Peer-to-Peer Botnet. In Proceedings of European Conference on Computer Network Defense, 2009.
-
Proceedings of European Conference on Computer Network Defense, 2009
-
-
Stock, B.1
Gobel, J.2
Engelberth, M.3
Freiling, F.4
Holz, T.5
-
23
-
-
84869407868
-
The Underground Economy of Fake Antivirus Software
-
B. Stone-Gross, R. Abman, R. Kemmerer, C. Kruegel, D. Steigerwald, and G. Vigna. The Underground Economy of Fake Antivirus Software. In Proceedings of the Workshop on Economics of Information Security, 2011.
-
Proceedings of the Workshop on Economics of Information Security, 2011
-
-
Stone-Gross, B.1
Abman, R.2
Kemmerer, R.3
Kruegel, C.4
Steigerwald, D.5
Vigna, G.6
-
24
-
-
74049154670
-
Your Botnet is My Botnet: Analysis of a Botnet Takeover
-
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna. Your Botnet is My Botnet: Analysis of a Botnet Takeover. In Proceedings of the ACM Conference on Computer and Communications Security, 2009.
-
Proceedings of the ACM Conference on Computer and Communications Security, 2009
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
|