-
1
-
-
80855127906
-
-
Anti-Phishing Working Group and others: Anti-Phishing Working Group
-
Anti-Phishing Working Group and others: Phishing Activity Trends Report - 1H2011. Anti-Phishing Working Group (2011)
-
(2011)
Phishing Activity Trends Report - 1H2011
-
-
-
2
-
-
85068725031
-
Building a dynamic reputation system for dns
-
USENIX Association, Berkeley
-
Antonakakis, M., Perdisci, R., Dagon, D., Lee, W., Feamster, N.: Building a dynamic reputation system for dns. In: Proceedings of the 19th USENIX Conference on Security, USENIX Security 2010, p. 18. USENIX Association, Berkeley (2010)
-
(2010)
Proceedings of the 19th USENIX Conference on Security, USENIX Security 2010
, pp. 18
-
-
Antonakakis, M.1
Perdisci, R.2
Dagon, D.3
Lee, W.4
Feamster, N.5
-
3
-
-
85068675731
-
Detecting malware domains at the upper dns hierarchy
-
USENIX Association, Berkeley
-
Antonakakis, M., Perdisci, R., Lee, W., Vasiloglou II, N., Dagon, D.: Detecting malware domains at the upper dns hierarchy. In: Proceedings of the 20th USENIX Conference on Security, SEC 2011, p. 27. USENIX Association, Berkeley (2011)
-
(2011)
Proceedings of the 20th USENIX Conference on Security, SEC 2011
, pp. 27
-
-
Antonakakis, M.1
Perdisci, R.2
Lee, W.3
Vasiloglou II, N.4
Dagon, D.5
-
4
-
-
84922594806
-
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis
-
Internet Society February
-
Bilge, L., Kirda, E., Kruegel, C., Balduzz, M.: EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis. In: NDSS 2011. Internet Society (February 2011)
-
(2011)
NDSS 2011
-
-
Bilge, L.1
Kirda, E.2
Kruegel, C.3
Balduzz, M.4
-
5
-
-
78650083240
-
Lexical feature based phishing url detection using online learning
-
ACM
-
Blum, A., Wardman, B., Solorio, T., Warner, G.: Lexical feature based phishing url detection using online learning. In: Proceedings of the 3rd ACM Workshop on Artificial Intelligence and Security, pp. 54-60. ACM (2010)
-
(2010)
Proceedings of the 3rd ACM Workshop on Artificial Intelligence and Security
, pp. 54-60
-
-
Blum, A.1
Wardman, B.2
Solorio, T.3
Warner, G.4
-
7
-
-
85084096166
-
On the potential of proactive domain blacklisting
-
USENIX Association
-
Felegyhazi, M., Kreibich, C., Paxson, V.: On the potential of proactive domain blacklisting. In: Proceedings of the 3rd USENIX Conference on Large-Scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More, p. 6. USENIX Association (2010)
-
(2010)
Proceedings of the 3rd USENIX Conference on Large-Scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More
, pp. 6
-
-
Felegyhazi, M.1
Kreibich, C.2
Paxson, V.3
-
8
-
-
77952338717
-
A framework for detection and measurement of phishing attacks
-
ACM
-
Garera, S., Provos, N., Chew, M., Rubin, A.D.: A framework for detection and measurement of phishing attacks. In: Proceedings of the 2007 ACM Workshop on Recurring Malcode, pp. 1-8. ACM (2007)
-
(2007)
Proceedings of the 2007 ACM Workshop on Recurring Malcode
, pp. 1-8
-
-
Garera, S.1
Provos, N.2
Chew, M.3
Rubin, A.D.4
-
9
-
-
80053635070
-
Evaluating a semisupervised approach to phishing url identification in a realistic scenario
-
ACM
-
Gyawali, B., Solorio, T., Wardman, B., Warner, G., et al.: Evaluating a semisupervised approach to phishing url identification in a realistic scenario. In: Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, pp. 176-183. ACM (2011)
-
(2011)
Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference
, pp. 176-183
-
-
Gyawali, B.1
Solorio, T.2
Wardman, B.3
Warner, G.4
-
10
-
-
82955186887
-
Monitoring the initial DNS behavior of malicious domains
-
ACM, New York
-
Hao, S., Feamster, N., Pandrangi, R.: Monitoring the initial DNS behavior of malicious domains. In: Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC 2011, pp. 269-278. ACM, New York (2011)
-
(2011)
Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC 2011
, pp. 269-278
-
-
Hao, S.1
Feamster, N.2
Pandrangi, R.3
-
11
-
-
80053641138
-
Lexical url analysis for discriminating phishing and legitimate websites
-
ACM
-
Khonji, M., Iraqi, Y., Jones, A.: Lexical url analysis for discriminating phishing and legitimate websites. In: Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, pp. 109-115. ACM (2011)
-
(2011)
Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference
, pp. 109-115
-
-
Khonji, M.1
Iraqi, Y.2
Jones, A.3
-
12
-
-
84885001189
-
DISCO: A Multilingual Database of Distributionally Similar Words
-
Storrer, A., Geyken, A., Siebert, A., Würzner, K.-M. (eds.)
-
Kolb, P.: DISCO: A Multilingual Database of Distributionally Similar Words. In: Storrer, A., Geyken, A., Siebert, A., Würzner, K.-M. (eds.) KONVENS 2008 - Ergänzungsband: Textressourcen und Lexikalisches Wissen, pp. 37-44 (2008)
-
(2008)
KONVENS 2008 - Ergänzungsband: Textressourcen und Lexikalisches Wissen
, pp. 37-44
-
-
Kolb, P.1
-
13
-
-
79960861049
-
Phishdef: Url names say it all
-
IEEE
-
Le, A., Markopoulou, A., Faloutsos, M.: Phishdef: Url names say it all. In: INFOCOM, 2011 Proceedings IEEE, pp. 191-195. IEEE (2011)
-
(2011)
INFOCOM, 2011 Proceedings IEEE
, pp. 191-195
-
-
Le, A.1
Markopoulou, A.2
Faloutsos, M.3
-
14
-
-
37849049401
-
On the Effectiveness of Techniques to Detect Phishing Sites
-
Hämmerli, B.M., Sommer, R. (eds.) DIMVA 2007. Springer, Heidelberg
-
Ludl, C., Mcallister, S., Kirda, E., Kruegel, C.: On the Effectiveness of Techniques to Detect Phishing Sites. In: Hämmerli, B.M., Sommer, R. (eds.) DIMVA 2007. LNCS, vol. 4579, pp. 20-39. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4579
, pp. 20-39
-
-
Ludl, C.1
Mcallister, S.2
Kirda, E.3
Kruegel, C.4
-
15
-
-
71149108237
-
Identifying suspicious urls: An application of large-scale online learning
-
ACM
-
Ma, J., Saul, L., Savage, S., Voelker, G.: Identifying suspicious urls: an application of large-scale online learning. In: Proceedings of the 26th Annual International Conference on Machine Learning, pp. 681-688. ACM (2009)
-
(2009)
Proceedings of the 26th Annual International Conference on Machine Learning
, pp. 681-688
-
-
Ma, J.1
Saul, L.2
Savage, S.3
Voelker, G.4
-
16
-
-
84861666496
-
Semantic Exploration of DNS
-
Bestak, R., Kencl, L., Li, L.E., Widmer, J., Yin, H. (eds.) NETWORKING 2012, Part I. Springer, Heidelberg
-
Marchal, S., François, J., Wagner, C., Engel, T.: Semantic Exploration of DNS. In: Bestak, R., Kencl, L., Li, L.E., Widmer, J., Yin, H. (eds.) NETWORKING 2012, Part I. LNCS, vol. 7289, pp. 370-384. Springer, Heidelberg (2012)
-
LNCS
, vol.7289
, Issue.2012
, pp. 370-384
-
-
Marchal, S.1
François, J.2
Wagner, C.3
Engel, T.4
-
19
-
-
85029359239
-
Development of the domain name system
-
IEEE Computer Society, Stanford
-
Mockapetris, P., Dunlap, K.: Development of the domain name system. In: Proceedings of the 1988 ACM SIGCOMM, pp. 123-133. IEEE Computer Society, Stanford (1988)
-
(1988)
Proceedings of the 1988 ACM SIGCOMM
, pp. 123-133
-
-
Mockapetris, P.1
Dunlap, K.2
-
20
-
-
77953329477
-
Phishnet: Predictive blacklisting to detect phishing attacks
-
IEEE
-
Prakash, P., Kumar, M., Kompella, R., Gupta, M.: Phishnet: predictive blacklisting to detect phishing attacks. In: INFOCOM, 2010 Proceedings IEEE, pp. 1-5. IEEE (2010)
-
(2010)
INFOCOM, 2010 Proceedings IEEE
, pp. 1-5
-
-
Prakash, P.1
Kumar, M.2
Kompella, R.3
Gupta, M.4
-
23
-
-
77953306876
-
Predictive blacklisting as an implicit recommendation system
-
IEEE
-
Soldo, F., Le, A., Markopoulou, A.: Predictive blacklisting as an implicit recommendation system. In: INFOCOM, 2010 Proceedings IEEE, pp. 1-9. IEEE (2010)
-
(2010)
INFOCOM, 2010 Proceedings IEEE
, pp. 1-9
-
-
Soldo, F.1
Le, A.2
Markopoulou, A.3
-
24
-
-
84864241290
-
SDBF: Smart DNS Brute-Forcer
-
IEEE Computer Society
-
Wagner, C., François, J., State, R., Engel, T., Dulaunoy, A., Wagener, G.: SDBF: Smart DNS Brute-Forcer. In: Proceedings of IEEE/IFIP Network Operations and Management Symposium - NOMS. IEEE Computer Society (2012)
-
(2012)
Proceedings of IEEE/IFIP Network Operations and Management Symposium - NOMS
-
-
Wagner, C.1
François, J.2
State, R.3
Engel, T.4
Dulaunoy, A.5
Wagener, G.6
-
26
-
-
65249165325
-
Spamming botnets: Signatures and characteristics
-
ACM
-
Xie, Y., Yu, F., Achan, K., Panigrahy, R., Hulten, G., Osipkov, I.: Spamming botnets: signatures and characteristics. In: ACM SIGCOMM Computer Communication Review, vol. 38, pp. 171-182. ACM (2008)
-
(2008)
ACM SIGCOMM Computer Communication Review
, vol.38
, pp. 171-182
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
-
27
-
-
78650869579
-
Detecting algorithmically generated malicious domain names
-
ACM
-
Yadav, S., Reddy, A.K.K., Reddy, AL, Ranjan, S.: Detecting algorithmically generated malicious domain names. In: Proceedings of the 10th Annual Conference on Internet Measurement, pp. 48-61. ACM (2010)
-
(2010)
Proceedings of the 10th Annual Conference on Internet Measurement
, pp. 48-61
-
-
Yadav, S.1
Reddy, A.K.K.2
Reddy, A.L.3
Ranjan, S.4
-
28
-
-
85077707798
-
Highly predictive blacklisting
-
USENIX Association
-
Zhang, J., Porras, P., Ullrich, J.: Highly predictive blacklisting. In: Proceedings of the 17th Conference on Security Symposium, pp. 107-122. USENIX Association (2008)
-
(2008)
Proceedings of the 17th Conference on Security Symposium
, pp. 107-122
-
-
Zhang, J.1
Porras, P.2
Ullrich, J.3
|