-
2
-
-
35348924865
-
-
NDSS February
-
Zhang, Y., Egelman, S., Cranor, L., Hong, J.: Phinding phish: Evaluating Anti-Phishing tools. In: NDSS (February 2007)
-
(2007)
Phinding Phish: Evaluating Anti-Phishing Tools
-
-
Zhang, Y.1
Egelman, S.2
Cranor, L.3
Hong, J.4
-
3
-
-
77953329477
-
Phishnet: Predictive blacklisting to detect phishing attacks
-
March 2010
-
Prakash, P., Kumar, M., Kompella, R., Gupta, M.: Phishnet: Predictive blacklisting to detect phishing attacks. In: INFOCOM, pp. 1-5 (March 2010)
-
INFOCOM
, pp. 1-5
-
-
Prakash, P.1
Kumar, M.2
Kompella, R.3
Gupta, M.4
-
4
-
-
70350630557
-
Beyond blacklists: Learning to detect malicious web sites from suspicious URLs
-
June
-
Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Beyond blacklists: Learning to detect malicious web sites from suspicious URLs. In: KDD, pp. 1245-1254 (June 2009)
-
(2009)
KDD
, pp. 1245-1254
-
-
Ma, J.1
Saul, L.K.2
Savage, S.3
Voelker, G.M.4
-
6
-
-
77952338717
-
A framework for detection and measurement of phishing attacks
-
Garera, S., Provos, N., Chew, M., Rubin, A.D.: A framework for detection and measurement of phishing attacks. In: WORM, 1-8 (2007)
-
(2007)
WORM
, pp. 1-8
-
-
Garera, S.1
Provos, N.2
Chew, M.3
Rubin, A.D.4
-
7
-
-
35348905575
-
-
WWW May
-
Zhang, Y., Hong, J.I., Cranor, L.F.: Cantina: A content-based approach to detecting phishing web sites. In: WWW, pp. 639-648 (May 2007)
-
(2007)
Cantina: A Content-based Approach to Detecting Phishing Web Sites
, pp. 639-648
-
-
Zhang, Y.1
Hong, J.I.2
Cranor, L.F.3
-
8
-
-
85084096603
-
A view on current malware behaviors
-
April
-
Bayer, U., Habibi, I., Balzarotti, D., Kirda, E., Kruegel, C.: A view on current malware behaviors. In: LEET, pp. 1-11 (April 2009)
-
(2009)
LEET
, pp. 1-11
-
-
Bayer, U.1
Habibi, I.2
Balzarotti, D.3
Kirda, E.4
Kruegel, C.5
-
9
-
-
79958728571
-
Sandnet: Network traffic analysis of malicious software
-
Rossow, C., Dietrich, C.J., Bos, H., Cavallaro, L., et al.: Sandnet: network traffic analysis of malicious software. In: BADGERS (April 2011)
-
(2011)
BADGERS (April
-
-
Rossow, C.1
Dietrich, C.J.2
Bos, H.3
Cavallaro, L.4
-
12
-
-
77954497121
-
-
ASIACCS (April 2010
-
Song, C., Zhuge, J., Han, X., Ye, Z.: Preventing drive-by download via inter-module communication monitoring. In: ASIACCS, pp. 124-134 (April 2010)
-
Preventing Drive-by Download Via Inter-module Communication Monitoring
, pp. 124-134
-
-
Song, C.1
Zhuge, J.2
Han, X.3
Ye, Z.4
-
13
-
-
85006397404
-
Large-scale automatic classification of phishing pages
-
Whittaker, C., Ryner, B., Nazif, M.: Large-scale automatic classification of phishing pages. In: NDSS (February 2010)
-
(2010)
NDSS (February
-
-
Whittaker, C.1
Ryner, B.2
Nazif, M.3
-
14
-
-
80053650188
-
All your iframes point to us
-
May
-
Provos, N., Mavrommatis, P., Rajab, M.A., Monrose, F.: All your iframes point to us. In: IEEE S&P Conference (Oakland), pp. 1-15 (May 2008)
-
(2008)
IEEE S&P Conference (Oakland
, pp. 1-15
-
-
Provos, N.1
Mavrommatis, P.2
Rajab, M.A.3
Monrose, F.4
-
15
-
-
79960020276
-
-
Holz, T., Bos, H. (eds DIMVA 2011. LNCS Springer, Heidelberg
-
Maier, G., Feldmann, A., Paxson, V., Sommer, R., Vallentin, M.: An Assessment of Overt Malicious Activity Manifest in Residential Networks. In: Holz, T., Bos, H. (eds.) DIMVA 2011. LNCS, vol. 6739, pp. 144-163. Springer, Heidelberg (2011)
-
(2011)
An Assessment of Overt Malicious Activity Manifest in Residential Networks
, vol.6739
, pp. 144-163
-
-
Maier, G.1
Feldmann, A.2
Paxson, V.3
Sommer, R.4
Vallentin, M.5
-
17
-
-
84904820148
-
Introducing the webb spam corpus: Using email spam to identify web spam automatically
-
July
-
Webb, S., Caverlee, J., Pu, C.: Introducing the webb spam corpus: Using email spam to identify web spam automatically. In: CEAS (July 2006)
-
(2006)
CEAS
-
-
Webb, S.1
Caverlee, J.2
Pu, C.3
-
18
-
-
84904821876
-
Characterizing web spam using content and http session analysis
-
July
-
Webb, S., Caverlee, J., Pu, C.: Characterizing web spam using content and http session analysis. In: CEAS (July 2007)
-
(2007)
CEAS
-
-
Webb, S.1
Caverlee, J.2
Pu, C.3
-
19
-
-
84908490561
-
Warningbird: Detecting suspicious URLs in twitter stream
-
(February 2012
-
Lee, S., Kim, J.: Warningbird: Detecting suspicious URLs in twitter stream. In: NDSS, pp. 1-13 (February 2012)
-
NDSS
, pp. 1-13
-
-
Lee, S.1
Kim, J.2
-
20
-
-
67649946711
-
-
Moon, S.B., Teixeira, R., Uhlig, S. (eds PAM 2009. LNCS Springer, Heidelberg
-
Konte, M., Feamster, N., Jung, J.: Dynamics of Online Scam Hosting Infrastructure. In: Moon, S.B., Teixeira, R., Uhlig, S. (eds.) PAM 2009. LNCS, vol. 5448, pp. 219-228. Springer, Heidelberg (2009)
-
(2009)
Dynamics of Online Scam Hosting Infrastructure
, vol.5448
, pp. 219-228
-
-
Konte, M.1
Feamster, N.2
Jung, J.3
-
21
-
-
84928140517
-
-
NDSS February
-
Holz, T., Gorecki, C., Rieck, K., Freiling, F.: Measuring and detecting fast-flux service networks. In: NDSS (February 2008)
-
(2008)
Measuring and Detecting Fast-flux Service Networks
-
-
Holz, T.1
Gorecki, C.2
Rieck, K.3
Freiling, F.4
-
22
-
-
84904804559
-
A study of URL redirection indicating spam
-
July
-
Bhargrava, K., Brewer, D., Li, K.: A study of URL redirection indicating spam. In: CEAS (July 2009)
-
(2009)
CEAS
-
-
Bhargrava, K.1
Brewer, D.2
Li, K.3
|