-
1
-
-
84861073648
-
we.b: The web of short URLs
-
D. Antoniades, I. Polakis, G. Kontaxis, E. Athanasopoulos, S. Ioannidis, E. P. Markatos, and T. Karagiannis. we.b: The web of short URLs. In Int. World Wide Web Conf. (WWW), 2011.
-
(2011)
Int. World Wide Web Conf. (WWW)
-
-
Antoniades, D.1
Polakis, I.2
Kontaxis, G.3
Athanasopoulos, E.4
Ioannidis, S.5
Markatos, E. P.6
Karagiannis, T.7
-
2
-
-
84860848688
-
Detecting spammers on Twitter
-
F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida. Detecting spammers on Twitter. In Collaboration, Electronic messaging, Anti-Abuse and Spam Conf. (CEAS), 2010.
-
(2010)
Collaboration, Electronic messaging, Anti-Abuse and Spam Conf. (CEAS)
-
-
Benevenuto, F.1
Magno, G.2
Rodrigues, T.3
Almeida, V.4
-
4
-
-
84872102454
-
-
Capture-HPC. https://projects.honeynet.org/capture-hpc.
-
Capture-HPC
-
-
-
6
-
-
78751493674
-
Who is tweeting on Twitter: Human, bot, or cyborg?
-
Z. Chu, S. Gianvecchio, H. Wang, and S. Jajodia. Who is tweeting on Twitter: Human, bot, or cyborg? In Annual Computer Security Applications Conf. (ACSAC), 2010.
-
(2010)
Annual Computer Security Applications Conf. (ACSAC)
-
-
Chu, Z.1
Gianvecchio, S.2
Wang, H.3
Jajodia, S.4
-
7
-
-
77954566293
-
Detection and analysis of drive-by-download attacks and malicious JavaScript code
-
M. Cova, C. Kruegel, and G. Vigna. Detection and analysis of drive-by-download attacks and malicious JavaScript code. In Int. World Wide Web Conf. (WWW), 2010.
-
(2010)
Int. World Wide Web Conf. (WWW)
-
-
Cova, M.1
Kruegel, C.2
Vigna, G.3
-
9
-
-
50949133669
-
LIBLINEAR: A library for large linear classification
-
R.-E. Fan, K.-W. Chang, C.-J. Hsieh, X.-R. Wang, and C.-J. Lin. LIBLINEAR: A library for large linear classification. Journal of Machine Learning Research, 9:1871-1874, 2008.
-
(2008)
Journal of Machine Learning Research
, vol.9
, pp. 1871-1874
-
-
Fan, R.-E.1
Chang, K.-W.2
Hsieh, C.-J.3
Wang, X.-R.4
Lin, C.-J.5
-
10
-
-
84874905168
-
-
Google
-
Google. Google safe browsing API. http://code. google.com/apis/safebrowsing.
-
Google safe browsing API
-
-
-
13
-
-
84980090975
-
The distribution of flora in the alpine zone
-
P. Jaccard. The distribution of flora in the alpine zone. The New Phytologist, 11(2):37-50, 1912.
-
(1912)
The New Phytologist
, vol.11
, Issue.2
, pp. 37-50
-
-
Jaccard, P.1
-
15
-
-
77954619566
-
What is Twitter, a social network or a news media?
-
H. Kwak, C. Lee, H. Park, and S. Moon. What is Twitter, a social network or a news media? In Int. World Wide Web Conf. (WWW), 2010.
-
(2010)
Int. World Wide Web Conf. (WWW)
-
-
Kwak, H.1
Lee, C.2
Park, H.3
Moon, S.4
-
16
-
-
77956044597
-
Uncovering social spammers: Social honeypots + machine learning
-
K. Lee, J. Caverlee, and S. Webb. Uncovering social spammers: Social honeypots + machine learning. In ACM SIGIR Conf., 2010.
-
(2010)
ACM SIGIR Conf
-
-
Lee, K.1
Caverlee, J.2
Webb, S.3
-
20
-
-
84860775300
-
-
Technical report, Google
-
M. A. Rajab, L. Ballard, N. Jagpal, P. Mavrommatis, D. Nojiri, N. Provos, and L. Schmidt. Trends in circumventing web-malware detection. Technical report, Google, 2011.
-
(2011)
Trends in circumventing web-malware detection
-
-
Rajab, M. A.1
Ballard, L.2
Jagpal, N.3
Mavrommatis, P.4
Nojiri, D.5
Provos, N.6
Schmidt, L.7
-
22
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna. Your botnet is my botnet: Analysis of a botnet takeover. In ACM Conf. Computer and Communications Security (CCS), 2009.
-
(2009)
ACM Conf. Computer and Communications Security (CCS)
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
24
-
-
80051985554
-
Design and evaluation of a real-time URL spam filtering system
-
K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song. Design and evaluation of a real-time URL spam filtering system. In IEEE Symp. Security and Privacy (Oakland), 2011.
-
(2011)
IEEE Symp. Security and Privacy (Oakland)
-
-
Thomas, K.1
Grier, C.2
Ma, J.3
Paxson, V.4
Song, D.5
-
27
-
-
84873144695
-
-
Twitter Developers
-
Twitter Developers. Streaming API. https://dev. twitter.com/docs/streaming-api.
-
Streaming API
-
-
-
29
-
-
84904088330
-
Automated web patrol with Strider Honey Monkeys: Finding web sites that exploit browser vulnerabilities
-
Y.-M. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. King. Automated web patrol with Strider Honey Monkeys: Finding web sites that exploit browser vulnerabilities. In Network and Distributed System Security Symp. (NDSS), 2006.
-
(2006)
Network and Distributed System Security Symp. (NDSS)
-
-
Wang, Y.-M.1
Beck, D.2
Jiang, X.3
Roussev, R.4
Verbowski, C.5
Chen, S.6
King, S.7
|