-
1
-
-
84949626334
-
Spamscatter: Characterizing Internet scam hosting infrastructure
-
Anderson, D. S., Fleizach, C., Savage, S., and Voelker, G. M. Spamscatter: Characterizing Internet scam hosting infrastructure. In Proceedings of the Sixteenth USENIX Security Symposium, 2007.
-
Proceedings of the Sixteenth USENIX Security Symposium, 2007
-
-
Anderson, D.S.1
Fleizach, C.2
Savage, S.3
Voelker, G.M.4
-
2
-
-
40949116672
-
Link analysis for web spam detection
-
Becchetti, L., Castillo, C., Donato, D., Baeza-Yates R., and Leonardi, S. Link analysis for web spam detection. ACM Transactions on the Web, 2(1):1-42, 2008.
-
(2008)
ACM Transactions on the Web
, vol.2
, Issue.1
, pp. 1-42
-
-
Becchetti, L.1
Castillo, C.2
Donato, D.3
Baeza-Yates, R.4
Leonardi, S.5
-
6
-
-
77954566293
-
Detection and analysis of drive-by-download attacks and malicious JavaScript code
-
Cova, M., Kruegel, C, and Vigna, G. Detection and analysis of drive-by-download attacks and malicious JavaScript code. In Proceedings of the Nineteenth International Conference on World Wide Web, pages 281-290, 2010.
-
(2010)
Proceedings of the Nineteenth International Conference on World Wide Web
, pp. 281-290
-
-
Cova, M.1
Kruegel, C.2
Vigna, G.3
-
8
-
-
70350714542
-
School of phish: A real-world evaluation of anti-phishing training
-
Kumaraguru, P., Cranshaw, J., Acquisti, A., Cranor, L., Hong, J., Blair, M. A., and Pham, T. School of phish: A real-world evaluation of anti-phishing training. In Proceedings of the Fifth Symposium on Usable Privacy and Security, pages 1-12, 2009.
-
(2009)
Proceedings of the Fifth Symposium on Usable Privacy and Security
, pp. 1-12
-
-
Kumaraguru, P.1
Cranshaw, J.2
Acquisti, A.3
Cranor, L.4
Hong, J.5
Blair, M.A.6
Pham, T.7
-
10
-
-
70049118528
-
Fast optimization methods for L1 regularization: A comparative study and two new approaches
-
Schmidt, M., Fung, G., and Rosales, R. Fast optimization methods for L1 regularization: A comparative study and two new approaches. In Proceedings of the European Conference on Machine Learning, 2007.
-
Proceedings of the European Conference on Machine Learning, 2007
-
-
Schmidt, M.1
Fung, G.2
Rosales, R.3
-
11
-
-
78751476222
-
Learning of personalized security settings
-
Sharifi, M., Fink, E., and Carbonell, J. G. Learning of personalized security settings. In Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2010.
-
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2010
-
-
Sharifi, M.1
Fink, E.2
Carbonell, J.G.3
-
12
-
-
83755178154
-
SmartNotes: Application of Crowdsourcing to the Detection of Web Threats
-
Sharifi, M., Fink, E., and Carbonell, J. G., SmartNotes: Application of Crowdsourcing to the Detection of Web Threats. In Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2011.
-
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2011
-
-
Sharifi, M.1
Fink, E.2
Carbonell, J.G.3
|