-
2
-
-
84954565691
-
-
What the trend. http://www.whatthetrend. com/.
-
What the trend
-
-
-
4
-
-
84949626334
-
Spamscatter: characterizing internet scam hosting infrastructure
-
(Berkeley, CA, USA), USENIX Association
-
ANDERSON, D. S., FLEIZACH, C., SAVAGE, S., AND VOELKER, G. M. Spamscatter: characterizing internet scam hosting infrastructure. In Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium (Berkeley, CA, USA, 2007), USENIX Association, pp. 10:1-10:14.
-
(2007)
Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
, pp. 10:1-10:14
-
-
ANDERSON, D. S.1
FLEIZACH, C.2
SAVAGE, S.3
VOELKER, G. M.4
-
5
-
-
72449133353
-
Detecting spammers and content promoters in online video social networks
-
(Boston, Massachusetts, USA, July)
-
BENEVENUTO, F., RODRIGUES, T., AND ALMEIDA, V. Detecting spammers and content promoters in online video social networks. In Proc. of SIGIR (Boston, Massachusetts, USA, July 2009).
-
(2009)
Proc. of SIGIR
-
-
BENEVENUTO, F.1
RODRIGUES, T.2
ALMEIDA, V.3
-
7
-
-
0010362121
-
Syntactic clustering of the web
-
(September)
-
BRODER, A. Z., GLASSMAN, S. C., MANASSE, M. S., AND ZWEIG, G. Syntactic clustering of the web. Comput. Netw. ISDN Syst. 29 (September 1997), 1157-1166.
-
(1997)
Comput. Netw. ISDN Syst
, vol.29
, pp. 1157-1166
-
-
BRODER, A. Z.1
GLASSMAN, S. C.2
MANASSE, M. S.3
ZWEIG, G.4
-
8
-
-
27144489164
-
A tutorial on support vector machines for pattern recognition
-
(June)
-
BURGES, C. J. C. A tutorial on support vector machines for pattern recognition. Data Min. Knowl. Discov. 2 (June 1998), 121-167.
-
(1998)
Data Min. Knowl. Discov
, vol.2
, pp. 121-167
-
-
BURGES, C. J. C.1
-
9
-
-
78650880229
-
Detecting and characterizing social spam campaigns
-
(New York, NY, USA), IMC '10, ACM
-
GAO, H., HU, J., WILSON, C., LI, Z., CHEN, Y., AND ZHAO, B. Y. Detecting and characterizing social spam campaigns. In Proceedings of the 10th annual conference on Internet measurement (New York, NY, USA, 2010), IMC '10, ACM, pp. 35-47.
-
(2010)
Proceedings of the 10th annual conference on Internet measurement
, pp. 35-47
-
-
GAO, H.1
HU, J.2
WILSON, C.3
LI, Z.4
CHEN, Y.5
ZHAO, B. Y.6
-
10
-
-
78650005374
-
@spam: the underground on 140 characters or less
-
(New York, NY, USA), CCS '10, ACM
-
GRIER, C., THOMAS, K., PAXSON, V., AND ZHANG, M. @spam: the underground on 140 characters or less. In Proceedings of the 17th ACM conference on Computer and communications security (New York, NY, USA, 2010), CCS '10, ACM, pp. 27-37.
-
(2010)
Proceedings of the 17th ACM conference on Computer and communications security
, pp. 27-37
-
-
GRIER, C.1
THOMAS, K.2
PAXSON, V.3
ZHANG, M.4
-
11
-
-
85041447270
-
Detecting spammers with snare: spatio-temporal network-level automatic reputation engine
-
(Berkeley, CA, USA), SSYM'09, USENIX Association
-
HAO, S., SYED, N. A., FEAMSTER, N., GRAY, A. G., AND KRASSER, S. Detecting spammers with snare: spatio-temporal network-level automatic reputation engine. In Proceedings of the 18th conference on USENIX security symposium (Berkeley, CA, USA, 2009), SSYM'09, USENIX Association, pp. 101-118.
-
(2009)
Proceedings of the 18th conference on USENIX security symposium
, pp. 101-118
-
-
HAO, S.1
SYED, N. A.2
FEAMSTER, N.3
GRAY, A. G.4
KRASSER, S.5
-
12
-
-
70349272437
-
Spamalytics: An empirical analysis of spam marketing conversion
-
(October)
-
KANICH, C., KREIBICH, C., LEVCHENKO, K., ENRIGHT, B., VOELKER, G. M., PAXSON, V., AND SAVAGE, S. Spamalytics: An empirical analysis of spam marketing conversion. In Proc. of the ACM Conference on Computer and Communications Security (October 2008).
-
(2008)
Proc. of the ACM Conference on Computer and Communications Security
-
-
KANICH, C.1
KREIBICH, C.2
LEVCHENKO, K.3
ENRIGHT, B.4
VOELKER, G. M.5
PAXSON, V.6
SAVAGE, S.7
-
13
-
-
85084095449
-
Spamcraft: An inside look at spam campaign orchestration
-
KREIBICH, C., KANICH, C., LEVCHENKO, K., ENRIGHT, B., VOELKER, G., PAXSON, V., AND SAVAGE, S. Spamcraft: An inside look at spam campaign orchestration. In Proc. of LEET (2009).
-
(2009)
Proc. of LEET
-
-
KREIBICH, C.1
KANICH, C.2
LEVCHENKO, K.3
ENRIGHT, B.4
VOELKER, G.5
PAXSON, V.6
SAVAGE, S.7
-
14
-
-
77956044597
-
Uncovering social spammers: social honeypots + machine learning
-
(New York, NY, USA), SIGIR '10, ACM
-
LEE, K., CAVERLEE, J., AND WEBB, S. Uncovering social spammers: social honeypots + machine learning. In Proceeding of the 33rd international ACM SIGIR conference on Research and development in information retrieval (New York, NY, USA, 2010), SIGIR '10, ACM, pp. 435-442.
-
(2010)
Proceeding of the 33rd international ACM SIGIR conference on Research and development in information retrieval
, pp. 435-442
-
-
LEE, K.1
CAVERLEE, J.2
WEBB, S.3
-
15
-
-
79960867975
-
SOAP: A Social Network Aided Personalized and Effective Spam Filter to Clean Your E-mail Box
-
(April)
-
LI, Z., AND SHEN, H. SOAP: A Social Network Aided Personalized and Effective Spam Filter to Clean Your E-mail Box. In Proceedings of the IEEE INFOCOM (April 2011).
-
(2011)
Proceedings of the IEEE INFOCOM
-
-
LI, Z.1
SHEN, H.2
-
17
-
-
85076893377
-
Spyproxy: executionbased detection of malicious web content
-
(Berkeley, CA, USA), USENIX Association, 3
-
MOSHCHUK, A., BRAGIN, T., DEVILLE, D., GRIBBLE, S. D., AND LEVY, H. M. Spyproxy: executionbased detection of malicious web content. In Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium (Berkeley, CA, USA, 2007), USENIX Association, pp. 3:1-3:16.
-
(2007)
Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
, pp. 1-3:16
-
-
MOSHCHUK, A.1
BRAGIN, T.2
DEVILLE, D.3
GRIBBLE, S. D.4
LEVY, H. M.5
-
18
-
-
82955238527
-
Botnet Judo: Fighting Spam with Itself
-
(San Diego, CA, USA, March)
-
PITSILLIDIS, A., LEVCHENKO, K., KREIBICH, C., KANICH, C., VOELKER, G., PAXSON, V., WEAVER, N., AND SAVAGE, S. Botnet Judo: Fighting Spam with Itself. In Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS) (San Diego, CA, USA, March 2010).
-
(2010)
Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS)
-
-
PITSILLIDIS, A.1
LEVCHENKO, K.2
KREIBICH, C.3
KANICH, C.4
VOELKER, G.5
PAXSON, V.6
WEAVER, N.7
SAVAGE, S.8
-
19
-
-
85089726744
-
On Network-level Clusters for Spam Detection
-
(San Diego, CA, USA, March)
-
QIAN, Z., MAO, Z. M., XIE, Y., AND YU, F. On Network-level Clusters for Spam Detection. In Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS) (San Diego, CA, USA, March 2010).
-
(2010)
Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS)
-
-
QIAN, Z.1
MAO, Z. M.2
XIE, Y.3
YU, F.4
-
21
-
-
33744584654
-
Induction of decision trees
-
(March)
-
QUINLAN, J. R. Induction of decision trees. Mach. Learn. 1 (March 1986), 81-106.
-
(1986)
Mach. Learn
, vol.1
, pp. 81-106
-
-
QUINLAN, J. R.1
-
22
-
-
77952388137
-
Filtering spam with behavioral blacklisting
-
(New York, NY, USA), CCS '07, ACM
-
RAMACHANDRAN, A., FEAMSTER, N., AND VEMPALA, S. Filtering spam with behavioral blacklisting. In Proceedings of the 14th ACM conference on Computer and communications security (New York, NY, USA, 2007), CCS '07, ACM, pp. 342-351.
-
(2007)
Proceedings of the 14th ACM conference on Computer and communications security
, pp. 342-351
-
-
RAMACHANDRAN, A.1
FEAMSTER, N.2
VEMPALA, S.3
-
23
-
-
79960856387
-
Prevalence and mitigation of forum spamming
-
(Shanghai, China), IEEE Computer Society
-
SHIN, Y., GUPTA, M., AND MYERS, S. Prevalence and mitigation of forum spamming. In Proceedings of IEEE International Conference on Computer Communicationi (INFOCOM) (Shanghai, China, 2011), IEEE Computer Society.
-
(2011)
Proceedings of IEEE International Conference on Computer Communicationi (INFOCOM)
-
-
SHIN, Y.1
GUPTA, M.2
MYERS, S.3
-
25
-
-
79959891780
-
Facebook immune system
-
(New York, NY, USA), ACM
-
STEIN, T., CHEN, E., AND MANGLA, K. Facebook immune system. In Proceedings of the 4th Workshop on Social Network Systems (SNS'11) (New York, NY, USA, 2011), ACM.
-
(2011)
Proceedings of the 4th Workshop on Social Network Systems (SNS'11)
-
-
STEIN, T.1
CHEN, E.2
MANGLA, K.3
-
26
-
-
78751502334
-
Detecting spammers on social networks
-
(New York, NY, USA), ACSAC '10, ACM
-
STRINGHINI, G., KRUEGEL, C., AND VIGNA, G. Detecting spammers on social networks. In Proceedings of the 26th Annual Computer Security Applications Conference (New York, NY, USA, 2010), ACSAC '10, ACM, pp. 1-9.
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference
, pp. 1-9
-
-
STRINGHINI, G.1
KRUEGEL, C.2
VIGNA, G.3
-
27
-
-
80051985554
-
Design and Evaluation of a Real-Time URL Spam Filtering Service
-
(May)
-
THOMAS, K., GRIER, C., MA, J., PAXSON, V., AND SONG, D. Design and Evaluation of a Real-Time URL Spam Filtering Service. In Proceedings of the IEEE Symposium on Security and Privacy (May 2011).
-
(2011)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
THOMAS, K.1
GRIER, C.2
MA, J.3
PAXSON, V.4
SONG, D.5
-
28
-
-
78751503389
-
Spam mitigation using spatio-temporal reputations from blacklist history
-
(New York, NY, USA), ACSAC '10, ACM
-
WEST, A. G., AVIV, A. J., CHANG, J., AND LEE, I. Spam mitigation using spatio-temporal reputations from blacklist history. In Proceedings of the 26th Annual Computer Security Applications Conference (New York, NY, USA, 2010), ACSAC '10, ACM, pp. 161-170.
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference
, pp. 161-170
-
-
WEST, A. G.1
AVIV, A. J.2
CHANG, J.3
LEE, I.4
-
29
-
-
70349153347
-
User interactions in social networks and their implications
-
WILSON, C., BOE, B., SALA, A., PUTTASWAMY, K. P., AND ZHAO, B. Y. User interactions in social networks and their implications. In Proceedings of the ACM European conference on Computer systems (2009).
-
(2009)
Proceedings of the ACM European conference on Computer systems
-
-
WILSON, C.1
BOE, B.2
SALA, A.3
PUTTASWAMY, K. P.4
ZHAO, B. Y.5
-
30
-
-
58449122201
-
Spamming botnets: signatures and characteristics
-
XIE, Y., YU, F., ACHAN, K., PANIGRAHY, R., HULTEN, G., AND OSIPKOV, I. Spamming botnets: signatures and characteristics. In Proc. of SIGCOMM (2008).
-
(2008)
Proc. of SIGCOMM
-
-
XIE, Y.1
YU, F.2
ACHAN, K.3
PANIGRAHY, R.4
HULTEN, G.5
OSIPKOV, I.6
-
32
-
-
77950275127
-
Detecting spam in a twitter network
-
YARDI, S., ROMERO, D., SCHOENEBECK, G., AND BOYD, D. Detecting spam in a twitter network. First Monday 15, 1 (2010).
-
(2010)
First Monday
, vol.15
, pp. 1
-
-
YARDI, S.1
ROMERO, D.2
SCHOENEBECK, G.3
BOYD, D.4
-
33
-
-
33749245586
-
Cost-sensitive learning by cost-proportionate example weighting
-
(Washington, DC, USA), ICDM'03, IEEE Computer Society
-
ZADROZNY, B., LANGFORD, J., AND ABE, N. Cost-sensitive learning by cost-proportionate example weighting. In Proceedings of the Third IEEE International Conference on Data Mining (Washington, DC, USA, 2003), ICDM'03, IEEE Computer Society, pp. 435-.
-
(2003)
Proceedings of the Third IEEE International Conference on Data Mining
, pp. 435
-
-
ZADROZNY, B.1
LANGFORD, J.2
ABE, N.3
-
34
-
-
79954733367
-
Botgraph: large scale spamming botnet detection
-
(Berkeley, CA, USA), USENIX Association
-
ZHAO, Y., XIE, Y., YU, F., KE, Q., YU, Y., CHEN, Y., AND GILLUM, E. Botgraph: large scale spamming botnet detection. In Proceedings of the 6th USENIX symposium on Networked systems design and implementation (Berkeley, CA, USA, 2009), USENIX Association, pp. 321-334.
-
(2009)
Proceedings of the 6th USENIX symposium on Networked systems design and implementation
, pp. 321-334
-
-
ZHAO, Y.1
XIE, Y.2
YU, F.3
KE, Q.4
YU, Y.5
CHEN, Y.6
GILLUM, E.7
-
35
-
-
85084095135
-
Characterizing botnets from email spam records
-
(Berkeley, CA, USA), USENIX Association, 2
-
ZHUANG, L., DUNAGAN, J., SIMON, D. R., WANG, H. J., AND TYGAR, J. D. Characterizing botnets from email spam records. In Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats (Berkeley, CA, USA, 2008), USENIX Association, pp. 2:1-2:9.
-
(2008)
Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
, pp. 1-2:9
-
-
ZHUANG, L.1
DUNAGAN, J.2
SIMON, D. R.3
WANG, H. J.4
TYGAR, J. D.5
-
36
-
-
34248995311
-
Modeling and simulation study of the propagation and defense of internet e-mail worms
-
(April)
-
ZOU, C. C., TOWSLEY, D., AND GONG, W. Modeling and simulation study of the propagation and defense of internet e-mail worms. IEEE Trans. Dependable Secur. Comput. 4 (April 2007), 105-118.
-
(2007)
IEEE Trans. Dependable Secur. Comput
, vol.4
, pp. 105-118
-
-
ZOU, C. C.1
TOWSLEY, D.2
GONG, W.3
|