-
1
-
-
84900825815
-
-
Uribl.com-realtime uri blacklist. www.uribl.coml.
-
-
-
-
2
-
-
84900834731
-
-
Zed-cash-spamwiki. http//spamtrackers.eulwikilindex.php/Zed-Cash.
-
-
-
-
3
-
-
85064176806
-
Measuring pay-perinstall the commoditization of malware distribution
-
Berkeley, CA, USA USENIX Association
-
J. Caballero, C. Grier, C. Kreibich, and V. Paxson. Measuring pay-perinstall the commoditization of malware distribution. In Proceedings of the 20th USENIX conference on Security, SEC'll, pages 13-13, Berkeley, CA, USA, 20 II. USENIX Association.
-
(2011)
Proceedings of the 20th USENIX Conference on Security, sec'Ll
, pp. 13-13
-
-
Caballero, J.1
Grier, C.2
Kreibich, C.3
Paxson, V.4
-
4
-
-
78650880229
-
Detecting and characterizing social spam campaigns
-
New York, NY, USA,. ACM.
-
H. Gao, J. Hu, C. Wilson, Z. Li, Y. Chen, and B. Y. Zhao. Detecting and characterizing social spam campaigns. In Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, IMC '10, pages 35-47, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, IMC '10
, pp. 35-47
-
-
Gao, H.1
Hu, J.2
Wilson, C.3
Li, Z.4
Chen, Y.5
Zhao, B.Y.6
-
5
-
-
78650005374
-
Spam the underground on 140 characters or less
-
New York, NY, USA,. ACM.
-
c. Grier, K. Thomas, V. Paxson, and M. Zhang. @spam the underground on 140 characters or less. In Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pages 27-37, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10
, pp. 27-37
-
-
Grier, C.1
Thomas, K.2
Paxson, V.3
Zhang, M.4
-
6
-
-
85076932663
-
Studying spamming botnets using botlab
-
Berkeley, CA, USA,. USENIX Association.
-
J. P. John, A. Moshchuk, S. D. Gribble, and A. Krishnamurthy. Studying spamming botnets using botlab. In Proceedings of the 6th USENIX symposium on Networked systems design and implementation, NSDI'09, pages 291-306, Berkeley, CA, USA, 2009. USENIX Association.
-
(2009)
Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, NSDI'09
, pp. 291-306
-
-
John, J.P.1
Moshchuk, A.2
Gribble, S.D.3
Krishnamurthy, A.4
-
7
-
-
85076487784
-
Deseo combating search-result poisoning
-
Berkeley, CA, USA USENIX Association
-
J. P. John, F. Yu, Y. Xie, A. Krishnamurthy, and M. Abadi. deseo combating search-result poisoning. In Proceedings of the 20th USENIX conference on Security, SEC'II, pages 20-20, Berkeley, CA, USA, 20 II. USENIX Association.
-
(2011)
Proceedings of the 20th USENIX Conference on Security, sec'Ii
, pp. 20-20
-
-
John, J.P.1
Yu, F.2
Xie, Y.3
Krishnamurthy, A.4
Abadi, M.5
-
8
-
-
70349272437
-
Spamalytics an empirical analysis of spam marketing conversion
-
New York, NY, USA,. ACM.
-
C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. M. Voelker, V. Paxson, and S. Savage. Spamalytics an empirical analysis of spam marketing conversion. In Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pages 3-14, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS '08
, pp. 3-14
-
-
Kanich, C.1
Kreibich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.M.5
Paxson, V.6
Savage, S.7
-
9
-
-
85076490024
-
Show me the money characterizing spam-advertised revenue
-
San Francisco, CA, August.
-
C. Kanich, N. Weaver, D. McCoy, T. Halvorson, C. Kreibich, K. Levchenko, V. Paxson, G. M. Voelker, and S. Savage. Show Me the Money Characterizing Spam-advertised Revenue. In Proceedings of the USENIX Security Symposium, San Francisco, CA, August 2011.
-
(2011)
Proceedings of the USENIX Security Symposium
-
-
Kanich, C.1
Weaver, N.2
McCoy, D.3
Halvorson, T.4
Kreibich, C.5
Levchenko, K.6
Paxson, V.7
Voelker, G.M.8
Savage, S.9
-
12
-
-
84888088814
-
Measuring and analyzing search-redirection attacks in the illicit online prescription drug trade
-
Berkeley, CA, USA,. USENIX Association.
-
N. Leontiadis, T. Moore, and N. Christin. Measuring and analyzing search-redirection attacks in the illicit online prescription drug trade. In Proceedings of the 20th USENIX conference on Security, SEC' 11, pages 19-19, Berkeley, CA, USA, 2011. USENIX Association.
-
(2011)
Proceedings of the 20th USENIX Conference on Security, SEC' 11
, pp. 19-19
-
-
Leontiadis, N.1
Moore, T.2
Christin, N.3
-
13
-
-
80051960199
-
Click trajectories End-to-end analysis of the spam value chain
-
Washington, DC, USA,. IEEE Computer Society.
-
K. Levchenko, A. Pitsillidis, N. Chachra, B. Enright, M. Felegyhazi, c. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, D. McCoy, N. Weaver, V. Paxson, G. M. Voelker, and S. Savage. Click trajectories End-to-end analysis of the spam value chain. In Proceedings of the 2011 IEEE Symposium on Security and Privacy, SP, 11, pages 431-446, Washington, DC, USA, 2011. IEEE Computer Society.
-
(2011)
Proceedings of the 2011 IEEE Symposium on Security and Privacy, SP, 11
, pp. 431-446
-
-
Levchenko, K.1
Pitsillidis, A.2
Chachra, N.3
Enright, B.4
Felegyhazi, M.5
Grier, C.6
Halvorson, T.7
Kanich, C.8
Kreibich, C.9
Liu, H.10
McCoy, D.11
Weaver, N.12
Paxson, V.13
Voelker, G.M.14
Savage, S.15
-
14
-
-
85084094479
-
On the effects of registrar-level intervention
-
Boston, MA, March.
-
H. Liu, K. Levchenko, M. Felegyhazi, c. Kreibich, G. Maier, G. M. Voelker, and S. Savage. On the effects of registrar-level intervention. In Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), Boston, MA, March 2011.
-
(2011)
Proceedings of the USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET
-
-
Liu, H.1
Levchenko, K.2
Felegyhazi, M.3
Kreibich, C.4
Maier, G.5
Voelker, G.M.6
Savage, S.7
-
15
-
-
84869463505
-
Priceless the role of payments in abuse-advertised goods
-
New York, NY, USA,. ACM.
-
D. McCoy, H. Dharmdasani, C. Kreibich, G. M. Voelker, and S. Savage. Priceless the role of payments in abuse-advertised goods. In Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pages 845-856, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12
, pp. 845-856
-
-
McCoy, D.1
Dharmdasani, H.2
Kreibich, C.3
Voelker, G.M.4
Savage, S.5
-
16
-
-
84900789776
-
Pharmaleaks understanding the business of online pharmaceutical affiliate programs
-
Berkeley, CA, USA,. USENIX Association.
-
D. McCoy, A. Pitsillidis, G. Jordan, N. Weaver, C. Kreibich, B. Krebs, G. M. Voelker, S. Savage, and K. Levchenko. Pharmaleaks understanding the business of online pharmaceutical affiliate programs. In Proceedings of the 21 st USENIX conference on Security symposium, Security' 12, pages 1-1, Berkeley, CA, USA, 2012. USENIX Association.
-
(2012)
Proceedings of the 21 St USENIX Conference on Security Symposium, Security' 12
, pp. 1-1
-
-
McCoy, D.1
Pitsillidis, A.2
Jordan, G.3
Weaver, N.4
Kreibich, C.5
Krebs, B.6
Voelker, G.M.7
Savage, S.8
Levchenko, K.9
-
17
-
-
85076285223
-
Re Captchas understanding captcha-solving services in an economic context
-
Berkeley, CA, USA,. USENIX Association.
-
M. Motoyama, K. Levchenko, C. Kanich, D. McCoy, G. M. Voelker, and S. Savage. Re Captchas understanding captcha-solving services in an economic context. In Proceedings of the 19th USENIX conference on Security, USENIX Security'lO, pages 28-28, Berkeley, CA, USA, 2010. USENIX Association.
-
(2010)
Proceedings of the 19th USENIX Conference on Security, USENIX security'Lo
, pp. 28-28
-
-
Motoyama, M.1
Levchenko, K.2
Kanich, C.3
McCoy, D.4
Voelker, G.M.5
Savage, S.6
-
19
-
-
85084095554
-
The nuts and bolts of a forum spam automator
-
Berkeley, CA, USA,. USENIX Association.
-
Y. Shin, M. Gupta, and S. Myers. The nuts and bolts of a forum spam automator. In Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats, LEET' 11, pages 3-3, Berkeley, CA, USA, 2011. USENIX Association.
-
(2011)
Proceedings of the 4th USENIX Conference on Large-scale Exploits and Emergent Threats, LEET' 11
, pp. 3-3
-
-
Shin, Y.1
Gupta, M.2
Myers, S.3
-
20
-
-
79960856387
-
Prevalence and mitigation of forum spamming
-
10-15 April, Shanghai, China. IEEE, 2011.
-
Y. Shin, M. Gupta, and S. A. Myers. Prevalence and mitigation of forum spamming. In INFOCOM 2011. 30th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 10-15 April 2011, Shanghai, China, pages 2309-2317. IEEE, 2011.
-
(2011)
INFOCOM 2011. 30th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies
, pp. 2309-2317
-
-
Shin, Y.1
Gupta, M.2
Myers, S.A.3
-
21
-
-
84869407868
-
The underground economy of fake antivirus software
-
B. Stone-Gross, R. Abman, R. Kemmerer, C. Kruegel, D. Steigerwald, and G. Vigna. The Underground Economy of Fake Antivirus Software. In Proceedings of the Workshop on Economics of Information Security (W EIS),2011.
-
(2011)
Proceedings of the Workshop on Economics of Information Security (W EIS
-
-
Stone-Gross, B.1
Abman, R.2
Kemmerer, R.3
Kruegel, C.4
Steigerwald, D.5
Vigna, G.6
-
22
-
-
82955161550
-
Suspended accounts in retrospect an analysis of twitter spam
-
New York, NY, USA,. ACM.
-
K. Thomas, C. Grier, D. Song, and V. Paxson. Suspended accounts in retrospect an analysis of twitter spam. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC '11, pages 243-258, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, IMC '11
, pp. 243-258
-
-
Thomas, K.1
Grier, C.2
Song, D.3
Paxson, V.4
-
23
-
-
80755187795
-
Cloak and dagger dynamics of web search cloaking
-
Chicago, IL, October 2011.
-
D. Wang, S. Savage, and G. M. Voelker. Cloak and dagger Dynamics of web search cloaking. In Proceedings of the ACM Cloud Computing Security Workshop, Chicago, IL, October 2011 2011.
-
(2011)
Proceedings of the ACM Cloud Computing Security Workshop
-
-
Wang, D.1
Savage, S.2
Voelker, G.M.3
|