-
1
-
-
84889048962
-
-
the Web Information Company
-
Alexa, the Web Information Company. http://www.alexa.com.
-
-
-
-
5
-
-
84869388520
-
Manufacturing compromise: The emergence of exploit-as-a-service
-
Chris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa, Andreas Pitsillidis, et al. Manufacturing compromise: The emergence of exploit-as-a-service. In ACM Conference on Computer and Communications Security (CCS), 2012.
-
ACM Conference on Computer and Communications Security (CCS), 2012
-
-
Grier, C.1
Ballard, L.2
Caballero, J.3
Chachra, N.4
Dietrich, C.J.5
Levchenko, K.6
Mavrommatis, P.7
McCoy, D.8
Nappa, A.9
Pitsillidis, A.10
-
6
-
-
76749092270
-
The WEKA Data Mining Software: An Update
-
Hall, M. and Frank, E. and Holmes, G. and Pfahringer, B. and Reutemann, P. and Witten, I.H. The WEKA Data Mining Software: An Update. In SIGKDD Explorations, 2009.
-
(2009)
SIGKDD Explorations
-
-
Hall, M.1
Frank, E.2
Holmes, G.3
Pfahringer, B.4
Reutemann, P.5
Witten, I.H.6
-
7
-
-
84889067443
-
-
McAfee Inc. Technical report
-
McAfee Inc. Mapping the Mal Web. Technical report, 2010.
-
(2010)
Mapping the Mal Web
-
-
-
8
-
-
84924656413
-
Revolver: An Automated Approach to the Detection of Evasive Web-based Malware
-
A. Kapravelos, Y. Shoshitaishvili, M. Cova, C. Kruegel, and G. Vigna. Revolver: An Automated Approach to the Detection of Evasive Web-based Malware. In USENIX Security Symposium, 2013.
-
USENIX Security Symposium, 2013
-
-
Kapravelos, A.1
Shoshitaishvili, Y.2
Cova, M.3
Kruegel, C.4
Vigna, G.5
-
11
-
-
84869390927
-
Knowing Your Enemy: Understanding and Detecting Malicious Web Advertising
-
Z. Li, K. Zhang, Y. Xie, F. Yu, and X.F. Wang. Knowing Your Enemy: Understanding and Detecting Malicious Web Advertising. In ACM Conference on Computer and Communications Security (CCS), 2012.
-
ACM Conference on Computer and Communications Security (CCS), 2012
-
-
Li, Z.1
Zhang, K.2
Xie, Y.3
Yu, F.4
Wang, X.F.5
-
12
-
-
85084094479
-
On the effects of registrarlevel intervention
-
H. Liu, K. Levchenko, M. Félegyházi, C. Kreibich, G. Maier, G.M. Voelker, and S. Savage. On the effects of registrarlevel intervention. In USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2011.
-
USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2011
-
-
Liu, H.1
Levchenko, K.2
Félegyházi, M.3
Kreibich, C.4
Maier, G.5
Voelker, G.M.6
Savage, S.7
-
23
-
-
84869407868
-
The Underground Economy of Fake Antivirus Software
-
B. Stone-Gross, R. Abman, R. Kemmerer, C. Kruegel, D. Steigerwald, and G. Vigna. The Underground Economy of Fake Antivirus Software. In Workshop on the Economics of Information Security (WEIS), 2011.
-
Workshop on the Economics of Information Security (WEIS), 2011
-
-
Stone-Gross, B.1
Abman, R.2
Kemmerer, R.3
Kruegel, C.4
Steigerwald, D.5
Vigna, G.6
-
24
-
-
82955165652
-
Understanding fraudulent activities in online ad exchanges
-
B. Stone-Gross, R. Stevens, A. Zarras, R. Kemmerer, C. Kruegel, and G. Vigna. Understanding fraudulent activities in online ad exchanges. In ACM SIGCOMM Conference on Internet Measurement, 2011.
-
ACM SIGCOMM Conference on Internet Measurement, 2011
-
-
Stone-Gross, B.1
Stevens, R.2
Zarras, A.3
Kemmerer, R.4
Kruegel, C.5
Vigna, G.6
-
25
-
-
80051985554
-
Design and Evaluation of a Real-time URL Spam Filtering Service
-
K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song. Design and Evaluation of a Real-time URL Spam Filtering Service. In IEEE Symposium on Security and Privacy, 2011.
-
IEEE Symposium on Security and Privacy, 2011
-
-
Thomas, K.1
Grier, C.2
Ma, J.3
Paxson, V.4
Song, D.5
-
28
-
-
33750356750
-
Automated Web Patrol with Strider Honeymonkeys
-
Y.M. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. King. Automated Web Patrol with Strider Honeymonkeys. In Symposium on Network and Distributed System Security (NDSS), 2006.
-
Symposium on Network and Distributed System Security (NDSS), 2006
-
-
Wang, Y.M.1
Beck, D.2
Jiang, X.3
Roussev, R.4
Verbowski, C.5
Chen, S.6
King, S.7
-
31
-
-
65249165325
-
Spamming Botnets: Signatures and Characteristics
-
Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov. Spamming Botnets: Signatures and Characteristics. In ACM SIGCOMM Computer Communication Review, 2008.
-
(2008)
ACM SIGCOMM Computer Communication Review
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
|