-
7
-
-
84949626334
-
Spamscatter: Characterizing internet scam hosting infrastructure
-
Boston, MA, Aug.
-
D. Anderson, C. Fleizach, S. Savage, and G. Voelker. Spamscatter: Characterizing internet scam hosting infrastructure. In Proc. USENIX Security' 07, pp. 1-14. Boston, MA, Aug. 2007.
-
(2007)
Proc. USENIX Security' 07
, pp. 1-14
-
-
Anderson, D.1
Fleizach, C.2
Savage, S.3
Voelker, G.4
-
8
-
-
78650002261
-
Dissecting one click frauds
-
Chicago, IL, October
-
N. Christin, S. Yanagihara, and K. Kamataki. Dissecting one click frauds. In Proc. ACM CCS'10, pp. 15-26, Chicago, IL, October 2010.
-
(2010)
Proc. ACM CCS'10
, pp. 15-26
-
-
Christin, N.1
Yanagihara, S.2
Kamataki, K.3
-
9
-
-
84904817958
-
How much did shutting down McColo help?
-
July
-
R. Clayton. How much did shutting down McColo help? In Proc. CEAS'09, July 2009.
-
(2009)
Proc CEAS'09
-
-
Clayton, R.1
-
10
-
-
0000336139
-
Regression models and life-tables
-
D. Cox. Regression models and life-tables. J. Royal Stat. Soc., Series B, 34:187-220, 1972.
-
(1972)
J. Royal Stat. Soc., Series B
, vol.34
, pp. 187-220
-
-
Cox, D.1
-
11
-
-
85084161366
-
Tor: The second-generation onion router
-
San Diego, CA, August
-
R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. In Proc. USENIX Security'04, pp. 303-320, San Diego, CA, August 2004.
-
(2004)
Proc. USENIX Security'04
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
12
-
-
85076486654
-
Srizbi grows into world's largest botnet
-
May
-
J. Dunn. Srizbi grows into world's largest botnet. CSO, May 2008. http://www.csoonline. com/article/356219/srizbi-growsinto-world-s-largest- botnet.
-
(2008)
CSO
-
-
Dunn, J.1
-
14
-
-
0003415244
-
-
June
-
R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee. RFC2616: Hypertext Transfer Protocol-HTTP/1.1. June 1999.
-
(1999)
RFC2616: Hypertext Transfer Protocol-HTTP/1.1
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masinter, L.5
Leach, P.6
Berners-Lee, T.7
-
15
-
-
0003984512
-
-
U.S. Food and Drug Administration, Nov.
-
U.S. Food and Drug Administration. National drug code directory, Nov. 2010. http://www.fda.gov/Drugs/ InformationOnDrugs/ucm142438.htm.
-
(2010)
National Drug Code Directory
-
-
-
16
-
-
77952415099
-
An inquiry into the nature and causes of the wealth of internet miscreants
-
Alexandria, VA, Oct.
-
J. Franklin, V. Paxson, A. Perrig, and S. Savage. An inquiry into the nature and causes of the wealth of internet miscreants. In Proc. ACM CCS'07, pp. 375-388, Alexandria, VA, Oct. 2007.
-
(2007)
Proc. ACM CCS'07
, pp. 375-388
-
-
Franklin, J.1
Paxson, V.2
Perrig, A.3
Savage, S.4
-
17
-
-
78650005374
-
@spam: The underground in 140 characters or less
-
Chicago, IL, Oct.
-
C. Grier, K. Thomas, V. Paxson, and M. Zhang. @spam: The underground in 140 characters or less. In Proc. ACM CCS'10, pp. 27-37, Chicago, IL, Oct. 2010.
-
(2010)
Proc. ACM CCS'10
, pp. 27-37
-
-
Grier, C.1
Thomas, K.2
Paxson, V.3
Zhang, M.4
-
18
-
-
0033534078
-
Internet purchase of prescription drugs: Buyer beware
-
Dec.
-
J. Henney, J. Shuren, S. Nightingale, and T. McGinnis. Internet purchase of prescription drugs: Buyer beware. Ann. Int. Med., 131(11):861-862, Dec. 1999.
-
(1999)
Ann. Int. Med.
, vol.131
, Issue.11
, pp. 861-862
-
-
Henney, J.1
Shuren, J.2
Nightingale, S.3
McGinnis, T.4
-
19
-
-
85076486185
-
Google, GoDaddy help form group to fight fake online pharmacies
-
Dec
-
K. Jackson Higgins. Google, GoDaddy help form group to fight fake online pharmacies. Dark Reading, Dec. 2010. http: //www.darkreading.com/security/ privacy/228800671/google-godaddyhelp-form-group-to-fight-fakeonline-pharmacies.html.
-
(2010)
Dark Reading
-
-
Jackson Higgins, K.1
-
20
-
-
84885665252
-
Accurately interpreting clickthrough data as implicit feedback
-
Salvador, Brazil, Aug.
-
T. Joachims, L. Granka, B. Pan, H. Hembrooke, and G. Gay. Accurately interpreting clickthrough data as implicit feedback. In Proc. ACM SIGIR'05, pp. 154-161, Salvador, Brazil, Aug. 2005.
-
(2005)
Proc. ACM SIGIR'05
, pp. 154-161
-
-
Joachims, T.1
Granka, L.2
Pan, B.3
Hembrooke, H.4
Gay, G.5
-
21
-
-
76549200437
-
Explicit estimates from capture-recapture data with both death and immigration - Stochastic model
-
G. Jolly. Explicit estimates from capture-recapture data with both death and immigration - stochastic model. Biometrika, 52(1-2):225-247, 1965.
-
(1965)
Biometrika
, vol.52
, Issue.1-2
, pp. 225-247
-
-
Jolly, G.1
-
22
-
-
70349272437
-
Spamalytics: An empirical analysis of spam marketing conversion
-
Alexandria, VA, Oct.
-
C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage. Spamalytics: An empirical analysis of spam marketing conversion. In Proc. ACM CCS'08, pp. 3-14, Alexandria, VA, Oct. 2008.
-
(2008)
Proc. ACM CCS'08
, pp. 3-14
-
-
Kanich, C.1
Kreibich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.5
Paxson, V.6
Savage, S.7
-
23
-
-
33845382806
-
Nonparametric estimation from incomplete observations
-
E. Kaplan and P. Meier. Nonparametric estimation from incomplete observations. J. Am. Stat. Assoc., 53:457-481, 1958.
-
(1958)
J. Am. Stat. Assoc.
, vol.53
, pp. 457-481
-
-
Kaplan, E.1
Meier, P.2
-
24
-
-
80051960199
-
Click trajectories: End-to-end analysis of the spam value chain
-
Oakland, CA, May To appear.
-
K. Levchenko, N. Chachra, B. Enright, M. Felegyhazi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, D. McCoy, A. Pitsillidis, N. Weaver, V. Paxson, G. Voelker, and S. Savage. Click trajectories: End-to-end analysis of the spam value chain. In Proc. IEEE Symp. Sec. and Privacy, Oakland, CA, May 2011. To appear.
-
(2011)
Proc. IEEE Symp. Sec. And Privacy
-
-
Levchenko, K.1
Chachra, N.2
Enright, B.3
Felegyhazi, M.4
Grier, C.5
Halvorson, T.6
Kanich, C.7
Kreibich, C.8
Liu, H.9
McCoy, D.10
Pitsillidis, A.11
Weaver, N.12
Paxson, V.13
Voelker, G.14
Savage, S.15
-
25
-
-
12344284234
-
Internet pharmacies and online prescription drug sales: A cross-sectional study
-
C. Littlejohn, A. Baldacchino, F. Schifano, and P. Deluca. Internet pharmacies and online prescription drug sales: A cross-sectional study. Drugs: Edu., Prev., and Policy, 12(1):75-80, 2005.
-
(2005)
Drugs: Edu., Prev., and Policy
, vol.12
, Issue.1
, pp. 75-80
-
-
Littlejohn, C.1
Baldacchino, A.2
Schifano, F.3
Deluca, P.4
-
26
-
-
84889067443
-
-
McAfee
-
McAfee. Mapping the Mal Web., 2010. http://us.mcafee.com/en-us/local/ docs/Mapping_Mal_Web.pdf.
-
(2010)
Mapping the Mal Web.
-
-
-
27
-
-
77953898602
-
Examining the impact of website take-down on phishing
-
Pittsburgh, PA, Oct.
-
T. Moore and R. Clayton. Examining the impact of website take-down on phishing. In Proc. APWG eCrime'07, pp. 1-13, Pittsburgh, PA, Oct. 2007.
-
(2007)
Proc. APWG eCrime'07
, pp. 1-13
-
-
Moore, T.1
Clayton, R.2
-
28
-
-
70449567102
-
The consequence of noncooperation in the fight against phishing
-
Atlanta, GA, October
-
T. Moore and R. Clayton. The consequence of noncooperation in the fight against phishing. In Proc. APWG eCrime'08, Atlanta, GA, October 2008.
-
(2008)
Proc. APWG eCrime'08
-
-
Moore, T.1
Clayton, R.2
-
29
-
-
70350398962
-
Evil searching: Compromise and recompromise of internet hosts for phishing
-
Barbados, February
-
T. Moore and R. Clayton. Evil searching: Compromise and recompromise of internet hosts for phishing. In Proc. Financial Crypto'09, LNCS 5628, pp. 256-272, Barbados, February 2009.
-
(2009)
Proc. Financial Crypto'09, LNCS
, vol.5628
, pp. 256-272
-
-
Moore, T.1
Clayton, R.2
-
30
-
-
75749102614
-
The economics of online crime
-
Summer
-
T. Moore, R. Clayton, and R. Anderson. The economics of online crime. J. Econ. Persp., 23(3):3-20, Summer 2009.
-
(2009)
J. Econ. Persp.
, vol.23
, Issue.3
, pp. 3-20
-
-
Moore, T.1
Clayton, R.2
Anderson, R.3
-
31
-
-
85084095292
-
Temporal correlations between spam and phishing websites
-
Boston, MA, April
-
T. Moore, R. Clayton, and H. Stern. Temporal correlations between spam and phishing websites. In Proc. USENIX LEET'09, Boston, MA, April 2009.
-
(2009)
Proc. USENIX LEET'09
-
-
Moore, T.1
Clayton, R.2
Stern, H.3
-
32
-
-
58149161861
-
As the net churns: Fast-flux botnet observations
-
Fairfax, VA, October
-
J. Nazario and T. Holz. As the net churns: Fast-flux botnet observations. In Proc. MALWARE'08, pp. 24-31, Fairfax, VA, October 2008.
-
(2008)
Proc. MALWARE'08
, pp. 24-31
-
-
Nazario, J.1
Holz, T.2
-
33
-
-
35348894730
-
A quantitative study of forum spamming using context-based analysis
-
San Diego, CA, Feb.
-
Y. Niu, H. Chen, F. Hsu, Y.-M. Wang, and M. Ma. A quantitative study of forum spamming using context-based analysis. In Proc. ISOC NDSS'07. San Diego, CA, Feb. 2007.
-
(2007)
Proc. ISOC NDSS'07
-
-
Niu, Y.1
Chen, H.2
Hsu, F.3
Wang, Y.-M.4
Ma, M.5
-
34
-
-
34250653315
-
Detecting spam web pages through content analysis
-
Edinburgh, Scotland, May
-
A. Ntoulas, M. Najork, M. Manasse, and D. Fetterly. Detecting spam web pages through content analysis. In Proc. WWW'06, pp. 83-92, Edinburgh, Scotland, May 2006.
-
(2006)
Proc. WWW'06
, pp. 83-92
-
-
Ntoulas, A.1
Najork, M.2
Manasse, M.3
Fetterly, D.4
-
35
-
-
85015919846
-
Implementation of the ryan haight online pharmacy consumer protection act of 2008
-
Department of Justice
-
Department of Justice. Implementation of the Ryan Haight Online Pharmacy Consumer Protection Act of 2008. Fed. Reg., 74(64):15596-15625, 2009.
-
(2009)
Fed. Reg.
, vol.74
, Issue.64
, pp. 15596-15625
-
-
-
36
-
-
20444504323
-
Uncovering the overlapping community structure of complex networks in nature and society
-
June
-
G. Palla, I. Derény, I. Farkas, and T. Vicsek. Uncovering the overlapping community structure of complex networks in nature and society. Nature, 435:814-818, June 2005.
-
(2005)
Nature
, vol.435
, pp. 814-818
-
-
Palla, G.1
Derény, I.2
Farkas, I.3
Vicsek, T.4
-
37
-
-
85076456884
-
Srizbi botnet sets new records for spam
-
May
-
D. Pauli. Srizbi botnet sets new records for spam. PCWorld, May 2008. http: //www.pcworld.com/businesscenter/ article/145631/srizbi_botnet_sets_ new_records_for_spam.html.
-
(2008)
PCWorld
-
-
Pauli, D.1
-
38
-
-
84862475529
-
-
PhpBB Ltd.
-
PhpBB Ltd. PhpBB website. http://www. phpbb.com.
-
PhpBB Website
-
-
-
39
-
-
82955238527
-
Botnet judo: Fighting spam with itself
-
San Diego, CA, March
-
A. Pitsillidis, K. Levchenko, C. Kreibich, C. Kanich, G.M. Voelker, V. Paxson, N. Weaver, and S. Savage. Botnet Judo: Fighting Spam with Itself. In Proc. ISOC NDSS'10, San Diego, CA, March 2010.
-
(2010)
Proc. ISOC NDSS'10
-
-
Pitsillidis, A.1
Levchenko, K.2
Kreibich, C.3
Kanich, C.4
Voelker, G.M.5
Paxson, V.6
Weaver, N.7
Savage, S.8
-
40
-
-
80053650188
-
All your iFrames point to us
-
San Jose, CA, Aug.
-
N. Provos, P. Mavrommatis, M. Rajab, and F. Monrose. All your iFrames point to us. In Proc. USENIX Security'08, pp. 1-16, San Jose, CA, Aug. 2008.
-
(2008)
Proc. USENIX Security'08
, pp. 1-16
-
-
Provos, N.1
Mavrommatis, P.2
Rajab, M.3
Monrose, F.4
-
41
-
-
34548856552
-
Near linear time algorithm to detect community structures in large-scale networks
-
U. Nandini Raghavan, R. Albert, and S. Kumara. Near linear time algorithm to detect community structures in large-scale networks. Phys. Rev. E, 76:036106, 2007.
-
(2007)
Phys. Rev. e
, vol.76
, pp. 036106
-
-
Nandini Raghavan, U.1
Albert, R.2
Kumara, S.3
-
42
-
-
33750365498
-
Understanding the network-level behavior of spammers
-
Pisa, Italy, Sep.
-
A. Ramachandran and N. Feamster. Understanding the network-level behavior of spammers. In Proc. ACM SIGCOMM'06, pp. 291-302, Pisa, Italy, Sep. 2006.
-
(2006)
Proc. ACM SIGCOMM'06
, pp. 291-302
-
-
Ramachandran, A.1
Feamster, N.2
-
43
-
-
33746227724
-
Statistical mechanics of community detection
-
July
-
J. Reichardt and S. Bornholdt. Statistical mechanics of community detection. Phys. Rev. E, 74(1):016110, July 2006.
-
(2006)
Phys. Rev. e
, vol.74
, Issue.1
, pp. 016110
-
-
Reichardt, J.1
Bornholdt, S.2
-
44
-
-
80051956616
-
The partnerka - What is it, and why should you care?
-
D. Samosseiko. The partnerka - what is it, and why should you care? In Virus Bulletin Conf., 2009.
-
(2009)
Virus Bulletin Conf.
-
-
Samosseiko, D.1
-
45
-
-
70350423437
-
The underground economy: Priceless
-
December
-
R. Thomas and J. Martin. The underground economy: Priceless. ;login:, 31(6):7-16, December 2006.
-
(2006)
;Login:
, vol.31
, Issue.6
, pp. 7-16
-
-
Thomas, R.1
Martin, J.2
-
46
-
-
85076456748
-
-
Verisign.
-
Verisign. The domain industry brief, 2010. http://www.verisigninc.com/assets/ Verisign_DNIB_Nov2010_WEB.pdf.
-
(2010)
The Domain Industry Brief
-
-
-
47
-
-
35348904515
-
Spam double-funnel: Connecting web spammers with advertisers
-
Banff, AB, Canada, May
-
Y.-M. Wang, M. Ma, Y. Niu, and H. Chen. Spam double-funnel: Connecting web spammers with advertisers. In Proc. WWW'07, pp. 291-300, Banff, AB, Canada, May 2007.
-
(2007)
Proc. WWW'07
, pp. 291-300
-
-
Wang, Y.-M.1
Ma, M.2
Niu, Y.3
Chen, H.4
-
48
-
-
85076462173
-
Researchers link storm botnet to illegal pharmaceutical sales
-
June
-
T. Wilson. Researchers link storm botnet to illegal pharmaceutical sales. Dark Reading, June 2008. http://www.darkreading. com/security/security-management/ 211201114/index.html.
-
(2008)
Dark Reading
-
-
Wilson, T.1
-
49
-
-
85076486442
-
-
Wordpress, September
-
Wordpress. Wordpress website, September 2009. http://www.wordpress.org.
-
(2009)
Wordpress Website
-
-
-
50
-
-
65249165325
-
Spamming botnets: Signatures and characteristics
-
Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov. Spamming botnets: Signatures and characteristics. ACM SIGCOMM Comp. Comm. Rev., 38(4):171-182, 2008.
-
(2008)
ACM SIGCOMM Comp. Comm. Rev.
, vol.38
, Issue.4
, pp. 171-182
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
-
51
-
-
77950621688
-
Studying malicious websites and the underground economy on the Chinese web
-
Springer
-
J. Zhuge, T. Holz, C. Song, J. Guo, X. Han, and W. Zou. Studying malicious websites and the underground economy on the Chinese web. In Managing Information Risk and the Economics of Security, pp. 225-244. Springer, 2008.
-
(2008)
Managing Information Risk and the Economics of Security
, pp. 225-244
-
-
Zhuge, J.1
Holz, T.2
Song, C.3
Guo, J.4
Han, X.5
Zou, W.6
|