-
1
-
-
84870648107
-
-
Cyber-Criminals Shift to Compromised Web Mail Accounts for Spam Delivery. http://www.eweek.com/c/a/Messaging-and-Collaboration/CyberCriminals-Shift-to- Compromised-Web-Mail-Accounts-for-Spam-Delivery-808933/.
-
-
-
-
5
-
-
84870646994
-
-
Rise in Hacked Gmail, Hotmail, and Yahoo Email. http://www.boxaid.com/ word/viruses-and-malware/rise-in-hacked-gmail-hotmailand-yahoo-email.
-
-
-
-
6
-
-
84870631009
-
-
Spammers Using Porn to Break Captchas. http://www.schneier.com/blog/ archives/2007/11/spammers-using.html.
-
-
-
-
7
-
-
84870652378
-
-
Twitter User Reputation Computed from Tweets. http://blog.tagwalk.com/ 2009/11/twitter-user-reputation-computed-from-tweets.
-
-
-
-
8
-
-
35348871999
-
Analysis of topological characteristics of huge online social networking services
-
Y. Ahn, S. Han, H. Kwak, S. Moon, and H. Jeong. Analysis of Topological Characteristics of Huge Online Social Networking Services. In WWW, 2007.
-
(2007)
WWW
-
-
Ahn, Y.1
Han, S.2
Kwak, H.3
Moon, S.4
Jeong, H.5
-
11
-
-
18244405757
-
Leveraging social networks to fight spam
-
P. Boykin and V. P. Roychowdhury. Leveraging Social Networks to Fight Spam. IEEE Computer, 38, 2005.
-
(2005)
IEEE Computer
, vol.38
-
-
Boykin, P.1
Roychowdhury, V.P.2
-
12
-
-
77955194191
-
How good are humans at solving CAPTCHAs? A large scale evaluation
-
E. Bursztein, S. Bethard, C. Fabry, J. C. Mitchell, and D. Jurafsky. How Good are Humans at Solving CAPTCHAs? A Large Scale Evaluation. In IEEE Syposium of Security and Privacy, 2010.
-
(2010)
IEEE Syposium of Security and Privacy
-
-
Bursztein, E.1
Bethard, S.2
Fabry, C.3
Mitchell, J.C.4
Jurafsky, D.5
-
13
-
-
85015988583
-
Aiding the detection of fake accounts in large scale social online services
-
Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro. Aiding the Detection of Fake Accounts in Large Scale Social Online Services. In NSDI, 2012.
-
(2012)
NSDI
-
-
Cao, Q.1
Sirivianos, M.2
Yang, X.3
Pregueiro, T.4
-
15
-
-
85180633166
-
SybilInfer: Detecting sybil nodes using social networks
-
G. Danezis and P. Mittal. SybilInfer: Detecting Sybil Nodes using Social Networks. In NDSS, 2009.
-
(2009)
NDSS
-
-
Danezis, G.1
Mittal, P.2
-
16
-
-
4544304744
-
The sybil attack
-
J. Douceur. The Sybil Attack. In IPTPS, 2002.
-
(2002)
IPTPS
-
-
Douceur, J.1
-
18
-
-
78650005374
-
@spam: The underground on 140 characters or less
-
C. Grier, K. Thomas, V. Paxson, and M. Zhang. @spam: The Underground on 140 Characters or Less. In CCS, 2010.
-
(2010)
CCS
-
-
Grier, C.1
Thomas, K.2
Paxson, V.3
Zhang, M.4
-
19
-
-
85041447270
-
Detecting spammers with SNARE: Spatio-temporal network-level automatic reputation engine
-
S. Hao, N. A. Syed, N. Feamster, A. G. Gray, and S. Krasser. Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine. In USENIX Security, 2009.
-
(2009)
USENIX Security
-
-
Hao, S.1
Syed, N.A.2
Feamster, N.3
Gray, A.G.4
Krasser, S.5
-
21
-
-
42149117427
-
Measurement and analysis of online social networks
-
A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee. Measurement and Analysis of Online Social Networks. In IMC, 2007.
-
(2007)
IMC
-
-
Mislove, A.1
Marcon, M.2
Gummadi, K.P.3
Druschel, P.4
Bhattacharjee, B.5
-
22
-
-
78650907130
-
Measuring the mixing time of social graphs
-
A. Mohaisen, A. Yun, and Y. Kim. Measuring the Mixing Time of Social Graphs. In IMC, 2010.
-
(2010)
IMC
-
-
Mohaisen, A.1
Yun, A.2
Kim, Y.3
-
23
-
-
85076285223
-
Re: CAPTCHAs-understanding CAPTCHA-solving services in an economic context
-
M. Motoyama, K. Levchenko, C. Kanich, D. McCoy, G. M. Voelker, and S. Savage. Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context. In Usenix Security, 2010.
-
(2010)
Usenix Security
-
-
Motoyama, M.1
Levchenko, K.2
Kanich, C.3
McCoy, D.4
Voelker, G.M.5
Savage, S.6
-
24
-
-
84880521520
-
Bazaar: Strengthening user reputations in online marketplaces
-
A. P. V. Shah and A. Mislove. Bazaar: Strengthening User Reputations in Online Marketplaces. In NSDI, 2011.
-
(2011)
NSDI
-
-
Shah, A.P.V.1
Mislove, A.2
-
28
-
-
70349153347
-
User interactions in social networks and their implications
-
C.Wilson, B. Boe, A. Sala, K. P. N. Puttaswamy, and B. Y. Zhao. User Interactions in Social Networks and their Implications. In EuroSys, 2009.
-
(2009)
EuroSys
-
-
Wilson, C.1
Boe, B.2
Sala, A.3
Puttaswamy, K.P.N.4
Zhao, B.Y.5
-
29
-
-
58449122201
-
Spamming botnets: Signatures and characteristics
-
Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov. Spamming Botnets: Signatures and Characteristics. In SIGCOMM, 2008.
-
(2008)
SIGCOMM
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
-
30
-
-
82955161549
-
Uncovering social network sybils in the wild
-
Z. Yang, C. Wilson, X. Wang, T. Gao, B. Y. Zhao, and Y. Dai. Uncovering Social Network Sybils in the Wild. In IMC, 2011.
-
(2011)
IMC
-
-
Yang, Z.1
Wilson, C.2
Wang, X.3
Gao, T.4
Zhao, B.Y.5
Dai, Y.6
-
32
-
-
35548992569
-
SybilGuard: Defending against sybil attacks via social networks
-
H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. SybilGuard: Defending Against Sybil Attacks via Social Networks. In SIGCOMM, 2006.
-
(2006)
SIGCOMM
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
-
33
-
-
70350591395
-
DryadLINQ: A system for general-purpose distributed data-parallel computing using a high-level language
-
Y. Yu, M. Isard, D. Fetterly, M. Budiu, U. Erlingsson, P. K. Gunda, and J. Currey. DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Language. In OSDI, 2008.
-
(2008)
OSDI
-
-
Yu, Y.1
Isard, M.2
Fetterly, D.3
Budiu, M.4
Erlingsson, U.5
Gunda, P.K.6
Currey, J.7
-
34
-
-
79954733367
-
BotGraph: Large scale spamming botnet detection
-
Y. Zhao, Y. Xie, F. Yu, Q. Ke, Y. Yu, Y. Chen, and E. Gillum. BotGraph: Large Scale Spamming Botnet Detection. In NSDI, 2009.
-
(2009)
NSDI
-
-
Zhao, Y.1
Xie, Y.2
Yu, F.3
Ke, Q.4
Yu, Y.5
Chen, Y.6
Gillum, E.7
|