-
1
-
-
84861638731
-
-
Annual Report
-
Interactive Advertising Bureau, Annual Report, http://www.iab.net/media/ file/IAB-Ad-Revenue-Full-Year-2009.pdf.
-
-
-
-
2
-
-
84861616420
-
-
Annual Forecast
-
The Kelsey Group, Annual Forecast, http://www.kelseygroup.com/press/ pr080225.asp.
-
-
-
-
4
-
-
33746338103
-
How click fraud could swallow the Internet
-
C. Mann, "How click fraud could swallow the Internet," Wired Magazine, 2006.
-
(2006)
Wired Magazine
-
-
Mann, C.1
-
5
-
-
77953050697
-
Click Fraud-The dark side of online advertising
-
B. Grow, B. Elgin, and M. Herbst, "Click Fraud-The dark side of online advertising," BusinessWeek online, vol. 10, no. 02, 2006.
-
(2006)
BusinessWeek Online
, vol.10
, Issue.2
-
-
Grow, B.1
Elgin, B.2
Herbst, M.3
-
8
-
-
84861638732
-
-
Spamhaus XBL, http://www.spamhaus.org/xbl/.
-
-
-
-
9
-
-
30344452311
-
Interpreting the data: Parallel analysis with Sawzall
-
R. Pike, S. Dorward, R. Griesemer, and S. Quinlan, "Interpreting the data: Parallel analysis with Sawzall," Scientific Programming, vol. 13, no. 4, pp. 277-298, 2005.
-
(2005)
Scientific Programming
, vol.13
, Issue.4
, pp. 277-298
-
-
Pike, R.1
Dorward, S.2
Griesemer, R.3
Quinlan, S.4
-
10
-
-
37549003336
-
MapReduce: Simplified data processing on large clusters
-
J. Dean and S. Ghemawat, "MapReduce: Simplified data processing on large clusters," Communications of the ACM, vol. 51, no. 1, pp. 107-113, 2008.
-
(2008)
Communications of the ACM
, vol.51
, Issue.1
, pp. 107-113
-
-
Dean, J.1
Ghemawat, S.2
-
12
-
-
33745205240
-
-
Butterworth-Heinemann
-
K. Najim, E. Ikonen, and A. Daoud, Stochastic processes: estimation, optimization, & analysis. Butterworth-Heinemann, 2004.
-
(2004)
Stochastic Processes: Estimation, Optimization, & Analysis
-
-
Najim, K.1
Ikonen, E.2
Daoud, A.3
-
13
-
-
0025952277
-
Divergence measures based on the shannon entropy
-
J. Lin, "Divergence measures based on the shannon entropy," IEEE Transactions on Information Theory, vol. 37, no. 1, pp. 145-151, 1991.
-
(1991)
IEEE Transactions on Information Theory
, vol.37
, Issue.1
, pp. 145-151
-
-
Lin, J.1
-
15
-
-
33744923764
-
Pay-per-percentage of impressions: An advertising method that is highly robust to fraud
-
J. Goodman, "Pay-per-percentage of impressions: an advertising method that is highly robust to fraud," in Workshop on Sponsored Search Auctions, 2005.
-
Workshop on Sponsored Search Auctions, 2005
-
-
Goodman, J.1
-
16
-
-
85077712186
-
Combating click fraud via premium clicks
-
USENIX Association
-
A. Juels, S. Stamm, and M. Jakobsson, "Combating click fraud via premium clicks," in Proceedings of 16th USENIX Security Symposium. USENIX Association, 2007, pp. 1-10.
-
(2007)
Proceedings of 16th USENIX Security Symposium
, pp. 1-10
-
-
Juels, A.1
Stamm, S.2
Jakobsson, M.3
-
17
-
-
35348835502
-
Detectives: Detecting coalition hit inflation attacks in advertising networks streams
-
ACM
-
A. Metwally, D. Agrawal, and A. El Abbadi, "Detectives: detecting coalition hit inflation attacks in advertising networks streams," in Proceedings of the 16th international conference on World Wide Web. ACM, 2007, pp. 241-250.
-
(2007)
Proceedings of the 16th International Conference on World Wide Web
, pp. 241-250
-
-
Metwally, A.1
Agrawal, D.2
El Abbadi, A.3
-
18
-
-
80051546602
-
SLEUTH: Single-pubLisher attack detection Using correlation Hunting
-
A. Metwally, F. Emekçi, D. Agrawal, and A. El Abbadi, "SLEUTH: Single-pubLisher attack detection Using correlation Hunting," Proceedings of the VLDB Endowment, vol. 1, no. 2, pp. 1217-1228, 2008.
-
(2008)
Proceedings of the VLDB Endowment
, vol.1
, Issue.2
, pp. 1217-1228
-
-
Metwally, A.1
Emekçi, F.2
Agrawal, D.3
El Abbadi, A.4
-
20
-
-
68049121093
-
Anomaly detection: A survey
-
V. Chandola, A. Banerjee, and V. Kumar, "Anomaly detection: A survey," ACM Computing Surveys (CSUR), vol. 41, no. 3, pp. 1-58, 2009.
-
(2009)
ACM Computing Surveys (CSUR)
, vol.41
, Issue.3
, pp. 1-58
-
-
Chandola, V.1
Banerjee, A.2
Kumar, V.3
-
21
-
-
77949360833
-
Fraud Detection in Telecommunications: History and Lessons Learned
-
R. Becker, C. Volinsky, and A. Wilks, "Fraud Detection in Telecommunications: History and Lessons Learned," Technometrics, vol. 52, no. 1, pp. 20-33, 2010.
-
(2010)
Technometrics
, vol.52
, Issue.1
, pp. 20-33
-
-
Becker, R.1
Volinsky, C.2
Wilks, A.3
-
22
-
-
75149179043
-
Histogram-based traffic anomaly detection
-
A. Kind, M. Stoecklin, and X. Dimitropoulos, "Histogram-based traffic anomaly detection," IEEE Transactions on Network and Service Management, vol. 6, no. 2, pp. 110-121, 2010.
-
(2010)
IEEE Transactions on Network and Service Management
, vol.6
, Issue.2
, pp. 110-121
-
-
Kind, A.1
Stoecklin, M.2
Dimitropoulos, X.3
-
23
-
-
36949011812
-
How dynamic are IP addresses?
-
Y. Xie, F. Yu, K. Achan, E. Gillum, M. Goldszmidt, and T. Wobber, "How dynamic are IP addresses?" ACM SIGCOMM Computer Communication Review, vol. 37, no. 4, pp. 301-312, 2007.
-
(2007)
ACM SIGCOMM Computer Communication Review
, vol.37
, Issue.4
, pp. 301-312
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Gillum, E.4
Goldszmidt, M.5
Wobber, T.6
|