-
1
-
-
80955131343
-
Judging a site by its content: Learning the textual, structural, and visual features of malicious Web Pages
-
S. N. Bannur, L. K. Saul, and S. Savage. Judging a site by its content: learning the textual, structural, and visual features of malicious Web Pages. In Proc. of the 4th ACM Workshop on Security and Artificial Intelligence, 2011.
-
Proc. Of the 4th ACM Workshop on Security and Artificial Intelligence, 2011
-
-
Bannur, S.N.1
Saul, L.K.2
Savage, S.3
-
5
-
-
85076487784
-
deSEO: Combating Search-Result Poisoning
-
J. P. John, F. Yu, Y. Xie, A. K. and M. Abadi. deSEO: Combating Search-Result Poisoning. In Proceedings of the 20th USENIX Security Symposium, August 2011.
-
Proceedings of the 20th USENIX Security Symposium, August 2011
-
-
John, J.P.1
Yu, F.2
Xie, Y.3
K, A.4
Abadi, M.5
-
7
-
-
85076490024
-
Show Me the Money: Characterizing Spam-advertised Revenue
-
C. Kanich, N. Weaver, D. McCoy, T. Halvorson, C. Kreibich, K. Levchenko, V. Paxson, G. M. Voelker, and S. Savage. Show Me the Money: Characterizing Spam-advertised Revenue. In Proc. of the USENIX Security Symposium, San Francisco, CA, Aug. 2011.
-
Proc. Of the USENIX Security Symposium, San Francisco, CA, Aug. 2011
-
-
Kanich, C.1
Weaver, N.2
McCoy, D.3
Halvorson, T.4
Kreibich, C.5
Levchenko, K.6
Paxson, V.7
Voelker, G.M.8
Savage, S.9
-
8
-
-
79952527132
-
Automatically determining phishing campaigns using the uscap methodology
-
Oct
-
R. Layton, P. Watters, and R. Dazeley. Automatically determining phishing campaigns using the uscap methodology. In eCrime Researchers Summit (eCrime), 2010, pages 1-8, Oct 2010.
-
(2010)
ECrime Researchers Summit (eCrime)
, vol.2010
, pp. 1-8
-
-
Layton, R.1
Watters, P.2
Dazeley, R.3
-
9
-
-
80051960199
-
Click Trajectories: End-to-End Analysis of the Spam Value Chain
-
K. Levchenko, A. Pitsillidis, N. Chachra, B. Enright, M. Félegyházi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, D. McCoy, N. Weaver, V. Paxson, G. M. Voelker, and S. Savage. Click Trajectories: End-to-End Analysis of the Spam Value Chain. In Proceedings of the IEEE Symposium and Security and Privacy, Oakland, CA, May 2011.
-
Proceedings of the IEEE Symposium and Security and Privacy, Oakland, CA, May 2011
-
-
Levchenko, K.1
Pitsillidis, A.2
Chachra, N.3
Enright, B.4
Félegyhá zi, M.5
Grier, C.6
Halvorson, T.7
Kanich, C.8
Kreibich, C.9
Liu, H.10
McCoy, D.11
Weaver, N.12
Paxson, V.13
Voelker, G.M.14
Savage, S.15
-
10
-
-
84869390927
-
Knowing Your Enemy: Understanding and Detecting Malicious Web Advertising
-
Z. Li, K. Zhang, Y. Xie, F. Yu, and X. Wang. Knowing Your Enemy: Understanding and Detecting Malicious Web Advertising. In Proc. of the ACM Conference on Computer and Communications Security (CCS), October 2012.
-
Proc. Of the ACM Conference on Computer and Communications Security (CCS), October 2012
-
-
Li, Z.1
Zhang, K.2
Xie, Y.3
Yu, F.4
Wang, X.5
-
11
-
-
60349123688
-
Detection of cloaked web spam by using tag-based methods
-
May
-
J.-L. Lin. Detection of cloaked web spam by using tag-based methods. Expert Syst. Appl., 36(4):7493-7499, May 2009.
-
(2009)
Expert Syst. Appl.
, vol.36
, Issue.4
, pp. 7493-7499
-
-
Lin, J.-L.1
-
13
-
-
84869463505
-
Priceless: The Role of Payments in Abuse-advertised Goods
-
D. McCoy, H. Dharmdasani, C. Kreibich, G. M. Voelker, and S. Savage. Priceless: The Role of Payments in Abuse-advertised Goods. In Proceedings of the ACM Conference on Computer and Communications Security, Raleigh, NC, Oct. 2012.
-
Proceedings of the ACM Conference on Computer and Communications Security, Raleigh, NC, Oct. 2012
-
-
McCoy, D.1
Dharmdasani, H.2
Kreibich, C.3
Voelker, G.M.4
Savage, S.5
-
14
-
-
84900789776
-
PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs
-
D. McCoy, A. Pitsillidis, G. Jordan, N. Weaver, C. Kreibich, B. Krebs, G. M. Voelker, S. Savage, and K. Levchenko. PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs. In Proceedings of the USENIX Security Symposium, Aug. 2012.
-
Proceedings of the USENIX Security Symposium, Aug. 2012
-
-
McCoy, D.1
Pitsillidis, A.2
Jordan, G.3
Weaver, N.4
Kreibich, C.5
Krebs, B.6
Voelker, G.M.7
Savage, S.8
Levchenko, K.9
-
16
-
-
84884644235
-
-
Cambridge University Press, New York, NY, USA, 2007
-
W. H. Press, S. A. Teukolsky, W. T. Vetterling, and B. P. Flannery. Numerical Recipes 3rd Edition: The Art of Scientific Computing. Cambridge University Press, New York, NY, USA, 2007.
-
Numerical Recipes 3rd Edition: The Art of Scientific Computing
-
-
Press, W.H.1
Teukolsky, S.A.2
Vetterling, W.T.3
Flannery, B.P.4
-
18
-
-
80051985554
-
Design and Evaluation of a Real-Time URL Spam Filtering Service
-
K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song. Design and Evaluation of a Real-Time URL Spam Filtering Service. In Proceedings of the IEEE Symposium on Security and Privacy, May 2011.
-
Proceedings of the IEEE Symposium on Security and Privacy, May 2011
-
-
Thomas, K.1
Grier, C.2
Ma, J.3
Paxson, V.4
Song, D.5
-
19
-
-
40949104348
-
Tracking Web Spam with HTML Style Similarities
-
Mar.
-
T. Urvoy, E. Chauveau, P. Filoche, and T. Lavergne. Tracking Web Spam with HTML Style Similarities. ACM Trans. Web, 2(1):3:1-3:28, Mar. 2008.
-
(2008)
ACM Trans. Web
, vol.2
, Issue.1
-
-
Urvoy, T.1
Chauveau, E.2
Filoche, P.3
Lavergne, T.4
-
20
-
-
84907020732
-
Juice: A Longitudinal Study of an SEO Campaign
-
D. Wang, S. Savage, and G. M. Voelker. Juice: A Longitudinal Study of an SEO Campaign. In Proc. of the Network and Distributed System Security Sympo sium (NDSS), San Diego, CA, Feb. 2013.
-
Proc. Of the Network and Distributed System Security Sympo Sium (NDSS), San Diego, CA, Feb. 2013
-
-
Wang, D.1
Savage, S.2
Voelker, G.M.3
|