-
1
-
-
84949626334
-
Spamscatter: Characterizing Internet scam hosting infrastructure
-
Anderson, D. S., Fleizach, C., Savage, S., and Voelker, G. M., Spamscatter: Characterizing Internet scam hosting infrastructure. In Proceedings of the Sixteenth USENIX Security Symposium, 2007.
-
Proceedings of the Sixteenth USENIX Security Symposium, 2007
-
-
Anderson, D.S.1
Fleizach, C.2
Savage, S.3
Voelker, G.M.4
-
2
-
-
70349266257
-
Robust defenses for cross-site request forgery
-
Barth, A., Jackson, C., and Mitchell, J. C., Robust defenses for cross-site request forgery. In Proceedings of the Fifteenth ACM conference on Computer and Communications Security, pages 75-88, 2008.
-
(2008)
Proceedings of the Fifteenth ACM Conference on Computer and Communications Security
, pp. 75-88
-
-
Barth, A.1
Jackson, C.2
Mitchell, J.C.3
-
3
-
-
40949116672
-
Link analysis for Web spam detection
-
Becchetti, L., Castillo, C., Donato, D., Baeza-Yates R., and Leonardi, S., Link analysis for Web spam detection. ACM Transactions on the Web, 2(1):1-42, 2008.
-
(2008)
ACM Transactions on the Web
, vol.2
, Issue.1
, pp. 1-42
-
-
Becchetti, L.1
Castillo, C.2
Donato, D.3
Baeza-Yates, R.4
Leonardi, S.5
-
6
-
-
79251564545
-
-
Unpublished Manuscript
-
Cormack, G. V., Smucker, M. D., and Clarke, C. L. A., Efficient and Effective Spam Filtering and Re-ranking for Large Web Datasets. Unpublished Manuscript, 2010.
-
(2010)
Efficient and Effective Spam Filtering and Re-ranking for Large Web Datasets
-
-
Cormack, G.V.1
Smucker, M.D.2
Clarke, C.L.A.3
-
7
-
-
77954566293
-
Detection and analysis of drive-by-download attacks and malicious JavaScript code
-
Cova, M., Kruegel, C, and Vigna, G., Detection and analysis of drive-by-download attacks and malicious JavaScript code. In Proceedings of the Nineteenth International Conference on World Wide Web, pages 281-290, 2010.
-
(2010)
Proceedings of the Nineteenth International Conference on World Wide Web
, pp. 281-290
-
-
Cova, M.1
Kruegel, C.2
Vigna, G.3
-
9
-
-
70350714542
-
School of phish: A real-world evaluation of anti-phishing training
-
Kumaraguru, P., Cranshaw, J., Acquisti, A., Cranor, L., Hong, J., Blair, M. A., and Pham, T., School of phish: A real-world evaluation of anti-phishing training. In Proceedings of the Fifth Symposium on Usable Privacy and Security, pages 1-12, 2009.
-
(2009)
Proceedings of the Fifth Symposium on Usable Privacy and Security
, pp. 1-12
-
-
Kumaraguru, P.1
Cranshaw, J.2
Acquisti, A.3
Cranor, L.4
Hong, J.5
Blair, M.A.6
Pham, T.7
-
11
-
-
78751476222
-
Learning of personalized security settings
-
Sharifi, M., Fink, E., and Carbonell, J. G., Learning of personalized security settings. In Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2010.
-
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2010
-
-
Sharifi, M.1
Fink, E.2
Carbonell, J.G.3
-
12
-
-
83755206461
-
Detection of Internet Scam Using Logistic Regression
-
Sharifi, M., Fink, E., and Carbonell, J. G., Detection of Internet Scam Using Logistic Regression. In Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2011.
-
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2011
-
-
Sharifi, M.1
Fink, E.2
Carbonell, J.G.3
|