-
1
-
-
84889052087
-
-
SOPHOS Security Team, SOPHOS, Tech. Rep., [Online]. Available
-
SOPHOS Security Team, "SOPHOS Security Threat Report 2013," SOPHOS, Tech. Rep., 2013. [Online]. Available: http://goo.gl/YuW65
-
(2013)
SOPHOS Security Threat Report 2013
-
-
-
4
-
-
84889073127
-
-
Facebook Security Team, Article, February [Online]. Available
-
Facebook Security Team, "Protecting People On Facebook, "Article, February 2013. [Online]. Available: http://goo.gl/OUPtk
-
(2013)
Protecting People on Facebook
-
-
-
5
-
-
84889060719
-
Exclusive: Apple, Macs hit by hackers who targeted Facebook
-
February [Online]. Available
-
J. Finke and J. Menn, "Exclusive: Apple, Macs hit by hackers who targeted Facebook," Reuters, February 2013. [Online]. Available: http://goo.gl/fzhIo
-
(2013)
Reuters
-
-
Finke, J.1
Menn, J.2
-
6
-
-
84880492977
-
A large-scale study of the evolution of web pages
-
Proceedings of the 12th International Conference on World Wide Web, ser. ACM
-
D. Fetterly, M. Manasse, M. Najork, and J. Wiener, "A large-scale study of the evolution of web pages," in Proceedings of the 12th International Conference on World Wide Web, ser. WWW '03. ACM, 2003, pp. 669-678.
-
(2003)
WWW '03
, pp. 669-678
-
-
Fetterly, D.1
Manasse, M.2
Najork, M.3
Wiener, J.4
-
7
-
-
84990932457
-
Evolutionary Dynamics of the world wide web
-
January
-
B. A. Huberman and L. A. Adamic, "Evolutionary Dynamics of the world wide web," Condensed Matter, January 1999.
-
(1999)
Condensed Matter
-
-
Huberman, B.A.1
Adamic, L.A.2
-
8
-
-
33750485861
-
Rate of Change and other Metrics: A Live Study of the World Wide Web
-
USENIX Association
-
F. Douglis, A. Feldmann, B. Krishnamurthy, and J. Mogul, "Rate of Change and other Metrics: a Live Study of the World Wide Web." in Proceedings of the USENIX Symposium on Internet Technologies and Systems, vol. 119. USENIX Association, 1997.
-
(1997)
Proceedings of the USENIX Symposium on Internet Technologies and Systems
, vol.119
-
-
Douglis, F.1
Feldmann, A.2
Krishnamurthy, B.3
Mogul, J.4
-
9
-
-
33845402536
-
Web Dynamics, Structure, and Page Quality
-
Springer-Verlag
-
R. Baeza-Yates, C. Castillo, and F. Saint-Jean, "Web Dynamics, Structure, and Page Quality," in Web Dynamics. Springer-Verlag, 2004, pp. 93-109.
-
(2004)
Web Dynamics
, pp. 93-109
-
-
Baeza-Yates, R.1
Castillo, C.2
Saint-Jean, F.3
-
10
-
-
76649142367
-
Protecting a Moving Target: Addressing Web Application Concept Drift
-
Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, ser. Springer-Verlag
-
F. Maggi, W. Robertson, C. Kruegel, and G. Vigna, "Protecting a Moving Target: Addressing Web Application Concept Drift," in Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, ser. RAID '09. Springer-Verlag, 2009, pp. 21-40.
-
(2009)
RAID '09
, pp. 21-40
-
-
Maggi, F.1
Robertson, W.2
Kruegel, C.3
Vigna, G.4
-
11
-
-
85080711655
-
The ghost in the browser analysis of web-based malware
-
First Workshop on Hot Topics in Understanding Botnets, ser. USENIX Association
-
N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. Modadugu, "The ghost in the browser analysis of web-based malware," in First Workshop on Hot Topics in Understanding Botnets, ser. HOTBOTS '07. USENIX Association, 2007, pp. 4-4.
-
(2007)
HOTBOTS '07
, pp. 4-4
-
-
Provos, N.1
McNamee, D.2
Mavrommatis, P.3
Wang, K.4
Modadugu, N.5
-
12
-
-
77954566293
-
Detection and analysis of drive-by-download attacks and malicious JavaScript code
-
Proceedings of the 19th International Conference on World Wide Web, ser. ACM
-
M. Cova, C. Kruegel, and G. Vigna, "Detection and analysis of drive-by-download attacks and malicious JavaScript code," in Proceedings of the 19th International Conference on World Wide Web, ser. WWW'10. ACM, 2010, pp. 281-290.
-
(2010)
WWW'10
, pp. 281-290
-
-
Cova, M.1
Kruegel, C.2
Vigna, G.3
-
13
-
-
84873447654
-
Prophiler: A fast lter for the large-scale detection of malicious web pages
-
Proceedings of the 20th International Conference on World Wide Web (WWW '11), ser. ACM
-
D. Canali, M. Cova, G. Vigna, and C. Kruegel, "Prophiler: a fast lter for the large-scale detection of malicious web pages," in Proceedings of the 20th International Conference on World Wide Web (WWW '11), ser. WWW '11. ACM, 2011, pp. 197-206.
-
(2011)
WWW '11
, pp. 197-206
-
-
Canali, D.1
Cova, M.2
Vigna, G.3
Kruegel, C.4
-
14
-
-
80053650188
-
All your iFRAMEs point to Us
-
Proceedings of the 17th USENIX Security Symposium, ser. USENIX Association
-
N. Provos, P. Mavrommatis, M. A. Rajab, and F. Monrose, "All your iFRAMEs point to Us," in Proceedings of the 17th USENIX Security Symposium, ser. SEC'08. USENIX Association, 2008, pp. 1-15.
-
(2008)
SEC'08
, pp. 1-15
-
-
Provos, N.1
Mavrommatis, P.2
Rajab, M.A.3
Monrose, F.4
-
17
-
-
0031167952
-
Meaningful Change Detection in Structured Data
-
Proceedings of the ACM SIGMOD International Conference on Management of Data, ser. ACM
-
S. S. Chawathe and H. Garcia-Molina, "Meaningful Change Detection in Structured Data," in Proceedings of the ACM SIGMOD International Conference on Management of Data, ser. MOD'97. ACM, 1997.
-
(1997)
MOD'97
-
-
Chawathe, S.S.1
Garcia-Molina, H.2
-
18
-
-
0344927764
-
X-Diff: An effective change detection algorithm for XML documents
-
Proceedings of the 19th International Conference on Data Engineering, ser. IEEE
-
Y. Wang, D. J. DeWitt, and J.-Y. Cai, "X-Diff: An effective change detection algorithm for XML documents," in Proceedings of the 19th International Conference on Data Engineering, ser. ICDE '03. IEEE, 2003, pp. 519-530.
-
(2003)
ICDE '03
, pp. 519-530
-
-
Wang, Y.1
DeWitt, D.J.2
Cai, J.-Y.3
-
19
-
-
0002719797
-
The Hungarian method for the assignment problem
-
H. W. Kuhn, "The Hungarian method for the assignment problem," Naval Research Logistics Quarterly, vol. 2, no. 1-2, pp. 83-97, 1955.
-
(1955)
Naval Research Logistics Quarterly
, vol.2
, Issue.1-2
, pp. 83-97
-
-
Kuhn, H.W.1
-
20
-
-
33746191665
-
Identifying almost identical files using context triggered piecewise hashing
-
0, the Proceedings of the 6th Annual Digital Forensic Research Workshop (DFRWS '06)
-
J. Kornblum, "Identifying almost identical files using context triggered piecewise hashing," Digital Investigation, vol. 3, no. 0, pp. 91-97, 2006, the Proceedings of the 6th Annual Digital Forensic Research Workshop (DFRWS '06).
-
(2006)
Digital Investigation
, vol.3
, pp. 91-97
-
-
Kornblum, J.1
-
21
-
-
84950419860
-
Advances in Record-Linkage Methodology as Applied to Matching the 1985 Census of Tampa, Florida
-
M. A. Jaro, "Advances in Record-Linkage Methodology as Applied to Matching the 1985 Census of Tampa, Florida," Journal of the American Statistical Association, vol. 84, no. 406, pp. 414-420, 1989.
-
(1989)
Journal of the American Statistical Association
, vol.84
, Issue.406
, pp. 414-420
-
-
Jaro, M.A.1
-
22
-
-
84888288499
-
Three approaches to the quantitative definition of information
-
A. N. Kolmogorov, "Three approaches to the quantitative definition of information," International Journal of Computer Mathematics, vol. 2, no. 1-4, pp. 157-168, 1968.
-
(1968)
International Journal of Computer Mathematics
, vol.2
, Issue.1-4
, pp. 157-168
-
-
Kolmogorov, A.N.1
-
23
-
-
84869428407
-
You Are What You Include: Large-scale Evaluation of Remote JavaScript Inclusions
-
Proceedings of the 19th ACM Conference on Computer and Communications Security, ser. ACM
-
N. Nikiforakis, L. Invernizzi, A. Kapravelos, S. Van Acker, W. Joosen, C. Kruegel, F. Piessens, and G. Vigna, "You Are What You Include: Large-scale Evaluation of Remote JavaScript Inclusions," in Proceedings of the 19th ACM Conference on Computer and Communications Security, ser. CCS '12. ACM, 2012.
-
(2012)
CCS '12
-
-
Nikiforakis, N.1
Invernizzi, L.2
Kapravelos, A.3
Van Acker, S.4
Joosen, W.5
Kruegel, C.6
Piessens, F.7
Vigna, G.8
-
24
-
-
85130734369
-
Knowledge Discovery and Data Mining: Towards a Unifying Framework
-
U. Fayyad, G. Piatetsky-Shapiro, P. Smyth et al., "Knowledge Discovery and Data Mining: Towards a Unifying Framework." Knowledge Discovery and Data Mining, vol. 96, pp. 82-88, 1996.
-
(1996)
Knowledge Discovery and Data Mining
, vol.96
, pp. 82-88
-
-
Fayyad, U.1
Piatetsky-Shapiro, G.2
Smyth, P.3
-
26
-
-
0347172110
-
OP-TICS: Ordering Points To Identify the Clustering Structure
-
Proceedings of the ACM SIGMOD International Conference on Management of Data, ser. ACM
-
M. Ankerst, M. M. Breunig, H.-P. Kriegel, and J. Sander, "OP-TICS: Ordering Points To Identify the Clustering Structure," in Proceedings of the ACM SIGMOD International Conference on Management of Data, ser. MOD'99. ACM, 1999, pp. 49-60.
-
(1999)
MOD'99
, pp. 49-60
-
-
Ankerst, M.1
Breunig, M.M.2
Kriegel, H.-P.3
Sander, J.4
-
27
-
-
84956852642
-
OPTICS-OF: Identifying Local Outliers
-
Springer-Verlag
-
M. Breunig, H.-P. Kriegel, R. T. Ng, and J. Sander, "OPTICS-OF: Identifying Local Outliers," in Lecture Notes in Computer Science. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
-
-
Breunig, M.1
Kriegel, H.-P.2
Ng, R.T.3
Sander, J.4
-
28
-
-
84870640932
-
EvilSeed: A Guided Approach to Finding Malicious Web Pages
-
0
-
L. Invernizzi, P. Milani Comparetti, S. Benvenuti, M. Cova, C. Kruegel, and G. Vigna, "EvilSeed: A Guided Approach to Finding Malicious Web Pages," Security and Privacy (SP), 2012 IEEE Symposium on, vol. 0, pp. 428-442, 2012.
-
Security and Privacy (SP), 2012 IEEE Symposium on
-
-
Invernizzi, L.1
Milani Comparetti, P.2
Benvenuti, S.3
Cova, M.4
Kruegel, C.5
Vigna, G.6
-
29
-
-
84924734121
-
Nozzle: A defense against heap-spraying code injection attacks
-
Proceedings of the 18th USENIX Security Symposium, ser. USENIX Association
-
P. Ratanaworabhan, B. Livshits, and B. Zorn, "Nozzle: A defense against heap-spraying code injection attacks," in Proceedings of the 18th USENIX Security Symposium, ser. SEC'09. USENIX Association, 2009, pp. 169-186.
-
(2009)
SEC'09
, pp. 169-186
-
-
Ratanaworabhan, P.1
Livshits, B.2
Zorn, B.3
-
30
-
-
85076498355
-
ZOZZLE: Fast and precise in-browser JavaScript malware detection
-
Proceedings of the 20th USENIX Security Symposium, ser. USENIX Association
-
C. Curtsinger, B. Livshits, B. Zorn, and C. Seifert, "ZOZZLE: fast and precise in-browser JavaScript malware detection," in Proceedings of the 20th USENIX Security Symposium, ser. SEC'11. USENIX Association, 2011, pp. 3-3.
-
(2011)
SEC'11
, pp. 3-3
-
-
Curtsinger, C.1
Livshits, B.2
Zorn, B.3
Seifert, C.4
-
31
-
-
64349114005
-
Identification of Malicious Web Pages with Static Heuristics
-
Telecommunication Networks and Applications Conference, ser.
-
C. Seifert, I. Welch, and P. Komisarczuk, "Identification of Malicious Web Pages with Static Heuristics," in Telecommunication Networks and Applications Conference, ser. ATNAC '08, 2008, pp. 91-96.
-
(2008)
ATNAC '08
, pp. 91-96
-
-
Seifert, C.1
Welch, I.2
Komisarczuk, P.3
-
32
-
-
84888984955
-
-
Retrieved, May [Online]. Available
-
"Discuz!" Retrieved, May 2013. [Online]. Available: http://goo.gl/e8nCD
-
(2013)
Discuz!
-
-
-
33
-
-
84889075882
-
Report on the success of the Discuz! software
-
August in Chinese. [Online]. Available
-
X. Yang, "Report on the success of the Discuz! software," Chinese National Radio Report, August 2010, in Chinese. [Online]. Available: http://goo.gl/beq4O
-
(2010)
Chinese National Radio Report
-
-
Yang, X.1
-
34
-
-
84860775300
-
-
M. Rajab, L. Ballard, N. Jagpal, P. Mavrommatis, D. Nojiri, N. Provos, and L. Schmidt, "Trends in Circumventing Web-Malware Detection," 2011.
-
(2011)
Trends in Circumventing Web-Malware Detection
-
-
Rajab, M.1
Ballard, L.2
Jagpal, N.3
Mavrommatis, P.4
Nojiri, D.5
Provos, N.6
Schmidt, L.7
-
35
-
-
74049102282
-
English shellcode
-
Proceedings of the 16th ACM Conference on Computer and Communications Security, ser. ACM
-
J. Mason, S. Small, F. Monrose, and G. MacManus, "English shellcode," in Proceedings of the 16th ACM Conference on Computer and Communications Security, ser. CCS '09. ACM, 2009, pp. 524-533.
-
(2009)
CCS '09
, pp. 524-533
-
-
Mason, J.1
Small, S.2
Monrose, F.3
MacManus, G.4
-
36
-
-
33846855150
-
Network-level polymorphic shellcode detection using emulation
-
10.1007/s11416-006-0031-z
-
M. Polychronakis, K. Anagnostakis, and E. Markatos, "Network-level polymorphic shellcode detection using emulation," Journal in Computer Virology, vol. 2, pp. 257-274, 2007, 10.1007/s11416-006-0031-z.
-
(2007)
Journal in Computer Virology
, vol.2
, pp. 257-274
-
-
Polychronakis, M.1
Anagnostakis, K.2
Markatos, E.3
-
37
-
-
84901361855
-
An Efficient Filtering Method for Detecting Malicious Web Pages
-
J. Choi, G. Kim, T. Kim, and S. Kim, "An Efficient Filtering Method for Detecting Malicious Web Pages," in Proceedings of the 13th International Workshop on Information Security Applications, 2012.
-
Proceedings of the 13th International Workshop on Information Security Applications, 2012
-
-
Choi, J.1
Kim, G.2
Kim, T.3
Kim, S.4
-
38
-
-
70349437016
-
Malicious web content detection by machine learning
-
Y.-T. Hou, Y. Chang, T. Chen, C.-S. Laih, and C.-M. Chen, Malicious web content detection by machine learning," Expert Systems with Applications, vol. 37, no. 1, pp. 55-60, 2010.
-
(2010)
Expert Systems with Applications
, vol.37
, Issue.1
, pp. 55-60
-
-
Hou, Y.-T.1
Chang, Y.2
Chen, T.3
Laih, C.-S.4
Chen, C.-M.5
-
39
-
-
70350630557
-
Beyond blacklists: Learning to detect malicious web sites from suspicious URLs
-
Proceedings of the 15th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, ser. ACM
-
J. Ma, L. K. Saul, S. Savage, and G. M. Voelker, "Beyond blacklists: learning to detect malicious web sites from suspicious URLs," in Proceedings of the 15th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, ser. KDD '09. ACM, 2009, pp. 1245-1254.
-
(2009)
KDD '09
, pp. 1245-1254
-
-
Ma, J.1
Saul, L.K.2
Savage, S.3
Voelker, G.M.4
-
40
-
-
83755178319
-
Malicious website detection: E ectiveness and efficiency issues
-
First SysSec Workshop, ser. IEEE
-
B. Eshete, A. Villafiorita, and K. Weldemariam, "Malicious website detection: E ectiveness and efficiency issues," in First SysSec Workshop, ser. SysSec. IEEE, 2011, pp. 123-126.
-
(2011)
SysSec.
, pp. 123-126
-
-
Eshete, B.1
Villafiorita, A.2
Weldemariam, K.3
-
41
-
-
85077681170
-
A Crawler-based Study of Spyware in the Web
-
Network and Distributed System Security Symposium, ser.
-
A. Moshchuk, T. Bragin, S. D. Gribble, and H. M. Levy, "A Crawler-based Study of Spyware in the Web," in Network and Distributed System Security Symposium, ser. NDSS '06, 2006.
-
(2006)
NDSS '06
-
-
Moshchuk, A.1
Bragin, T.2
Gribble, S.D.3
Levy, H.M.4
-
42
-
-
79957985082
-
Anomaly detection techniques for a web defacement monitoring service
-
Sep.
-
G. Davanzo, E. Medvet, and A. Bartoli, "Anomaly detection techniques for a web defacement monitoring service," Expert Systems with Applications, vol. 38, no. 10, pp. 12 521-12 530, Sep. 2011.
-
(2011)
Expert Systems with Applications
, vol.38
, Issue.10
, pp. 12521-12530
-
-
Davanzo, G.1
Medvet, E.2
Bartoli, A.3
|