-
1
-
-
85162075709
-
-
Brightmail. http://www.brightmail.com.
-
-
-
-
2
-
-
85162020846
-
-
SpamAssassin. http://www.spamassassin.apache.org.
-
-
-
-
3
-
-
85162032687
-
-
SpamHaus. http://www.spamhaus.net.
-
-
-
-
5
-
-
0031140246
-
How to use expert advice
-
CESA-BIANCHI, N., FREUND, Y., HAUSSLER, D., HELMBOLD, D. P., SCHAPIRE, R. E., AND WAR-MUTH, M. K. How to use expert advice. J. ACM 44, 3 (1997), 427-485.
-
(1997)
J. ACM
, vol.44
, Issue.3
, pp. 427-485
-
-
Cesa-Bianchi, N.1
Freund, Y.2
Haussler, D.3
Helmbold, D.P.4
Schapire, R.E.5
War-Muth, M.K.6
-
6
-
-
42149173109
-
Using uncleanliness to predict future botnet addresses
-
COLLINS, M. P., SHIMEALL, T. J., FABER, S., NAIES, J., WEAVER, R., AND SHON, M. D. Using uncleanliness to predict future botnet addresses. In Proceedings of the Internet Measurement Conference (2007).
-
(2007)
Proceedings of the Internet Measurement Conference
-
-
Collins, M.P.1
Shimeall, T.J.2
Faber, S.3
Naies, J.4
Weaver, R.5
Shon, M.D.6
-
7
-
-
3142735161
-
Diamond in the rough: Finding hierarchical heavy hitters in multi-dimensional data
-
CORMODE, G., KORN, F., MUTHUKRISHNAN, S., AND SRIVASTAVA, D. Diamond in the rough: Finding hierarchical heavy hitters in multi-dimensional data. In SIGMOD '04: Proceedings of the 2004 ACM SIGMOD international conference on Management of data (2004).
-
(2004)
SIGMOD '04: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data
-
-
Cormode, G.1
Korn, F.2
Muthukrishnan, S.3
Srivastava, D.4
-
9
-
-
14944346102
-
Automatically inferring patterns of resource consumption in network traffic
-
ESTAN, C., SAVAGE, S., AND VARGHESE, G. Automatically inferring patterns of resource consumption in network traffic. In Proceedings of SIGCOMM'03 (2003).
-
(2003)
Proceedings of SIGCOMM'03
-
-
Estan, C.1
Savage, S.2
Varghese, G.3
-
10
-
-
0030643068
-
Using and combining predictors that specialize
-
FREUND, Y., SCHAPIRE, R. E., SINGER, Y., AND WARMUTH, M. K. Using and combining predictors that specialize. In Proceedings of the Twenty-Ninth Annual Symposium on the Theory of Computing (STOC) (1997), pp. 334-343.
-
(1997)
Proceedings of the Twenty-ninth Annual Symposium on the Theory of Computing (STOC)
, pp. 334-343
-
-
Freund, Y.1
Schapire, R.E.2
Singer, Y.3
Warmuth, M.K.4
-
11
-
-
0031122905
-
Predicting nearly as well as the best pruning of a decision tree
-
HELMBOLD, D. P., AND SCHAPIRE, R. E. Predicting nearly as well as the best pruning of a decision tree. Machine Learning 27, 1 (1997), 51-68.
-
(1997)
Machine Learning
, vol.27
, Issue.1
, pp. 51-68
-
-
Helmbold, D.P.1
Schapire, R.E.2
-
13
-
-
77952325551
-
Efficient and effective decision tree construction on streaming data
-
JIN, R., AND AGARWAL, G. Efficient and effective decision tree construction on streaming data. In Proceedings of ACM SIGKDD (2003).
-
(2003)
Proceedings of ACM SIGKDD
-
-
Jin, R.1
Agarwal, G.2
-
16
-
-
33947198115
-
Observed structure of addresses in IP traffic
-
KOHLER, E., LI, J., PAXSON, V., AND SHENKER, S. Observed structure of addresses in IP traffic. IEEE/ACM Transactions in Networking 14, 6 (2006).
-
(2006)
IEEE/ACM Transactions in Networking
, vol.14
, pp. 6
-
-
Kohler, E.1
Li, J.2
Paxson, V.3
Shenker, S.4
-
18
-
-
34248379606
-
Analyzing large ddos attacks using multiple data sources
-
MAO, Z. M., SEKAR, V., SPATSCHECK, O., VAN DER MERWE, J., AND VASUDEVAN, R. Analyzing large ddos attacks using multiple data sources. In ACM SIGCOMM Workshop on Large Scale Attack Defense (2006).
-
(2006)
ACM SIGCOMM Workshop on Large Scale Attack Defense
-
-
Mao, Z.M.1
Sekar, V.2
Spatscheck, O.3
Van Der Merwe, J.4
Vasudevan, R.5
-
20
-
-
0022012946
-
Amortized efficiency of list update and paging rules
-
SLEATOR, D. D., AND TARJAN, R. E. Amortized efficiency of list update and paging rules. In Communications of the ACM (1985), vol. 28, pp. 202-208.
-
(1985)
Communications of the ACM
, vol.28
, pp. 202-208
-
-
Sleator, D.D.1
Tarjan, R.E.2
-
22
-
-
36849057675
-
Email prioritization: Reducing delays on legitimate mail caused by junk mail
-
TWINING, D., WILLIAMSON, M. M., MOWBRAY, M., AND RAHMOUNI, M. Email prioritization: Reducing delays on legitimate mail caused by junk mail. In USENIX Annual Technical Conference (2004).
-
(2004)
USENIX Annual Technical Conference
-
-
Twining, D.1
Williamson, M.M.2
Mowbray, M.3
Rahmouni, M.4
-
23
-
-
85162062114
-
Tracking dynamic sources of malicious activity at internet-scale
-
VENKATARAMAN, S., BLUM, A., SONG, D., SEN, S., AND SPATSCHECK, O. Tracking dynamic sources of malicious activity at internet-scale. Tech. Rep. TD-7NZS8K, AT&T Labs, 2009.
-
(2009)
Tech. Rep. TD-7nzs8k, AT&T Labs
-
-
Venkataraman, S.1
Blum, A.2
Song, D.3
Sen, S.4
Spatscheck, O.5
-
24
-
-
70350215415
-
Exploiting network structure for proactive spam mitigation
-
VENKATARAMAN, S., SEN, S., SPATSCHECK, O., HAFFNER, P., AND SONG, D. Exploiting network structure for proactive spam mitigation. In Proceedings of Usenix Security'07 (2007).
-
(2007)
Proceedings of Usenix Security'07
-
-
Venkataraman, S.1
Sen, S.2
Spatscheck, O.3
Haffner, P.4
Song, D.5
-
25
-
-
36949011812
-
How dynamic are IP addresses?
-
XIE, Y., YU, F., ACHAN, K., GILLUM, E., GOLDSZMIDT, M., AND WOBBER, T. How dynamic are IP addresses? In Proceedings of ACM SIGCOMM (2007).
-
(2007)
Proceedings of ACM SIGCOMM
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Gillum, E.4
Goldszmidt, M.5
Wobber, T.6
-
27
-
-
14944356227
-
Online identification of hierarchical heavy hitters: Algorithms, evaluation, and applications
-
New York, NY, USA ACM
-
ZHANG, Y., SINGH, S., SEN, S., DUFFIELD, N., AND LUND, C. Online identification of hierarchical heavy hitters: algorithms, evaluation, and applications. In IMC '04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement (New York, NY, USA, 2004), ACM, pp. 101-114.
-
(2004)
IMC '04: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement
, pp. 101-114
-
-
Zhang, Y.1
Singh, S.2
Sen, S.3
Duffield, N.4
Lund, C.5
|