-
1
-
-
84900302412
-
-
Alexa web information company
-
Alexa. 2009. Alexa web information company. http://www.alexa.com/ topsites/.
-
(2009)
-
-
-
3
-
-
85068725031
-
Building a dynamic reputation system for DNS
-
Antonakakis, M., Perdisci, R., Dagon, D., Lee, W., and Feamster, N. 2010. Building a dynamic reputation system for DNS. In Proceedings of the 19th Usenix Security Symposium.
-
(2010)
Proceedings of the 19th Usenix Security Symposium
-
-
Antonakakis, M.1
Perdisci, R.2
Dagon, D.3
Lee, W.4
Feamster, N.5
-
4
-
-
85068675731
-
Detecting malware domains at the upper DNS hierarchy
-
Antonakakis, M., Perdisci, R., Lee, W., Vasiloglou, N., and Dagon, D. 2011. Detecting malware domains at the upper DNS hierarchy. In Proceedings of the 20th Usenix Security Symposium.
-
(2011)
Proceedings of the 20th Usenix Security Symposium
-
-
Antonakakis, M.1
Perdisci, R.2
Lee, W.3
Vasiloglou, N.4
Dagon, D.5
-
5
-
-
85068676628
-
From throw-away traffic to bots: Detecting the rise of dga-based malware
-
Antonakakis, M., Perdisci, R., Nadji, Y., Vasiloglou, N., Abu-Nimeh, S., Lee, W., and Dagon, D. 2012. From throw-away traffic to bots: Detecting the rise of dga-based malware. In Proceedings of the 21st Usenix Security Symposium.
-
(2012)
Proceedings of the 21st Usenix Security Symposium
-
-
Antonakakis, M.1
Perdisci, R.2
Nadji, Y.3
Vasiloglou, N.4
Abu-Nimeh, S.5
Lee, W.6
Dagon, D.7
-
9
-
-
84922594806
-
Exposure: Finding malicious domains using passive DNS analysis
-
Bilge, L., Kirda, E., Kruegel, C., and Balduzzi, M. 2011. Exposure: Finding malicious domains using passive DNS analysis. In Proceedings of the Annual Network and Distributed System Security Symposium (NDSS'11).
-
(2011)
Proceedings of the Annual Network and Distributed System Security Symposium (NDSS'11)
-
-
Bilge, L.1
Kirda, E.2
Kruegel, C.3
Balduzzi, M.4
-
10
-
-
0031191630
-
The use of the area under the roc curve in the evaluation of machine learning algorithms
-
Bradley, A. P. 1997. The use of the area under the roc curve in the evaluation of machine learning algorithms. Pattern Recogn. 30, 1145-1159.
-
(1997)
Pattern Recogn.
, vol.30
, pp. 1145-1159
-
-
Bradley, A.P.1
-
12
-
-
14844324775
-
Iterative deepening dynamic time warping for time series
-
Chu, S., Keogh, E., Hart, D., Pazzani, M., and Michael. 2002. Iterative deepening dynamic time warping for time series. In Proceedings of the 2nd SIAM International Conference on Data Mining.
-
(2002)
Proceedings of the 2nd SIAM International Conference on Data Mining
-
-
Chu, S.1
Keogh, E.2
Hart, D.3
Pazzani, M.4
Michael5
-
13
-
-
84900345080
-
-
Cova, M. 2013. Wepawet. http://wepawet.iseclab.org/.
-
(2013)
-
-
Cova, M.1
-
18
-
-
84870631152
-
-
Google. 2010. Google safe browsing. http://www.google.com/tools/firefox/ safebrowsing/.
-
(2010)
Google Safe Browsing
-
-
-
19
-
-
84928140517
-
Measuring and detecting fast-flux service networks
-
Holz, T., Gorecki, C., Rieck, K., and Freiling, F. 2008. Measuring and detecting fast-flux service networks. In Proceedings of the Annual Network and Distributed System Security Symposium (NDSS'08).
-
(2008)
Proceedings of the Annual Network and Distributed System Security Symposium (NDSS'08)
-
-
Holz, T.1
Gorecki, C.2
Rieck, K.3
Freiling, F.4
-
21
-
-
0040748318
-
Locally adaptive dimensionality reduction for indexing large time series databases
-
Keogh, E., Chakrabarti, K., Pazzani, M., and Mehrotra, S. 2001. Locally adaptive dimensionality reduction for indexing large time series databases. In Proceedings of the ACM SIGMOD Conference on Management of Data (SIGMOD'01). 151-162.
-
(2001)
Proceedings of the ACM SIGMOD Conference on Management of Data (SIGMOD'01)
, pp. 151-162
-
-
Keogh, E.1
Chakrabarti, K.2
Pazzani, M.3
Mehrotra, S.4
-
24
-
-
84900314354
-
-
List, Z. B. 2009b. Zeus domain blocklist. https://zeustracker.abuse.ch/ blocklist.php?download=Domainblocklist.
-
(2009)
Zeus Domain Blocklist
-
-
List, Z.B.1
-
25
-
-
70350630557
-
Beyond blacklists: Learning to detect malicious web sites from suspicious urls
-
Ma, J., Saul, L. K., Savage, S., and Voelker, G. M. 2009. Beyond blacklists: Learning to detect malicious web sites from suspicious urls. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD'09). 1245-1254.
-
(2009)
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD'09)
, pp. 1245-1254
-
-
Ma, J.1
Saul, L.K.2
Savage, S.3
Voelker, G.M.4
-
26
-
-
84900315360
-
-
McAfee
-
McAfee. 2010. McAfee siteadvisor. http://www.siteadvisor.com/.
-
(2010)
McAfee Siteadvisor
-
-
-
28
-
-
84900313559
-
-
Norton. 2010. Norton safe web. http://safeweb.norton.com/.
-
(2010)
Norton Safe Web
-
-
-
30
-
-
49949091964
-
Fluxor: Detecting and monitoring fast-flux service networks
-
Passerini, E., Paleari, R., Martignoni, L., and Bruschi, D. 2008. Fluxor: Detecting and monitoring fast-flux service networks. In Proceedings of the 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA'08).
-
(2008)
Proceedings of the 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA'08)
-
-
Passerini, E.1
Paleari, R.2
Martignoni, L.3
Bruschi, D.4
-
31
-
-
77950795817
-
Detecting malicious flux service networks through passive analysis of recursive dns traces
-
Perdisci, R., Corona, I., Dagon, D., and Lee, W. 2009. Detecting malicious flux service networks through passive analysis of recursive dns traces. In Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC'09).
-
(2009)
Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC'09)
-
-
Perdisci, R.1
Corona, I.2
Dagon, D.3
Lee, W.4
-
32
-
-
84900296248
-
-
Phishtank. 2009. Phishtank. http://www.phishtank.com/.
-
(2009)
Phishtank
-
-
-
37
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C., and Vigna, G. 2009. Your botnet is my botnet: Analysis of a botnet takeover. In Proceedings of the ACM Conference on Computer and Communication Security (CCS'09).
-
(2009)
Proceedings of the ACM Conference on Computer and Communication Security (CCS'09)
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
38
-
-
84859583690
-
-
Symantec. 2011. Symantec threat report. http://www.symantec.com/business/ theme.jsp?themeid=threatreport.
-
(2011)
Symantec Threat Report
-
-
-
46
-
-
37849037483
-
Passive monitoring of dns anomalies
-
Zdrnja, B., Brownlee, N., and Wessels, D. 2007. Passive monitoring of dns anomalies. In Proceedings of the 4th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA'07). 129-139.
-
(2007)
Proceedings of the 4th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA'07)
, pp. 129-139
-
-
Zdrnja, B.1
Brownlee, N.2
Wessels, D.3
-
47
-
-
77957934042
-
Re-ranking of image search results using a graph algorithm
-
Zitouni, H., Sevil, S., Ozkan, D., and Duygulu, P. 2008. Re-ranking of image search results using a graph algorithm. In Proceedings of the 9th International Conference on Pattern Recognition.
-
(2008)
Proceedings of the 9th International Conference on Pattern Recognition
-
-
Zitouni, H.1
Sevil, S.2
Ozkan, D.3
Duygulu, P.4
|