-
1
-
-
84881095404
-
Measuring the cost of cybercrime
-
Berlin, Germany, June
-
R. Anderson, C. Barton, R. Böhme, R. Clayton, M. van Eeten, M. Levi, T. Moore, and S. Savage. Measuring the cost of cybercrime. In Proc. (online) WEIS 2012. Berlin, Germany, June 2012.
-
(2012)
Proc. (Online) WEIS 2012
-
-
Anderson, R.1
Barton, C.2
Böhme, R.3
Clayton, R.4
Van Eeten, M.5
Levi, M.6
Moore, T.7
Savage, S.8
-
2
-
-
84889006370
-
Delta: Automatic identification of unknown web-based infection campaigns
-
Berlin, Germany, November
-
K. Borgolte, C. Kruegel, and G. Vigna. Delta: automatic identification of unknown web-based infection campaigns. In Proc. ACM CCS 2013, pages 109-120, Berlin, Germany, November 2013.
-
(2013)
Proc. ACM CCS 2013
, pp. 109-120
-
-
Borgolte, K.1
Kruegel, C.2
Vigna, G.3
-
3
-
-
84910622939
-
Google forks over settlement on Rx ads
-
August
-
T. Catan. Google forks over settlement on Rx ads. The Wall Street Journal, August 2011. Available online at http://online.wsj.com/news/articles/SB10001424053111904787404576528332418595052.
-
(2011)
The Wall Street Journal
-
-
Catan, T.1
-
4
-
-
84910605700
-
-
Last accessed August 26, 2014
-
comScore. February 2014 US search engine rankings. https://www.comscore.com/Insights/Press-Releases/2014/3/comScore-Releases-February-2014-U.S.-Search-Engine-Rankings, 2014. Last accessed August 26, 2014.
-
(2014)
February 2014 US Search Engine Rankings
-
-
comScore1
-
5
-
-
0038830409
-
The procedural analysis of offending and its relevance for situational prevention
-
D. Cornish. The procedural analysis of offending and its relevance for situational prevention. Crime prevention studies, 3:151-196, 1994.
-
(1994)
Crime Prevention Studies
, vol.3
, pp. 151-196
-
-
Cornish, D.1
-
7
-
-
33745594858
-
Link spam alliances
-
Trondheim, Norway, August
-
Z. Gyöngyi and H. Garcia-Molina. Link spam alliances. In Proc. ACM VLDB 2005, pages 517-528, Trondheim, Norway, August 2005.
-
(2005)
Proc. ACM VLDB 2005
, pp. 517-528
-
-
Gyöngyi, Z.1
Garcia-Molina, H.2
-
9
-
-
84885665252
-
Accurately interpreting clickthrough data as implicit feedback
-
Salvador, Brazil
-
T. Joachims, L. Granka, B. Pan, H. Hembrooke, and G. Gay. Accurately interpreting clickthrough data as implicit feedback. In Proc. ACM SIGIR '05, pages 154-161, Salvador, Brazil, 2005.
-
(2005)
Proc. ACM SIGIR '05
, pp. 154-161
-
-
Joachims, T.1
Granka, L.2
Pan, B.3
Hembrooke, H.4
Gay, G.5
-
10
-
-
85076487784
-
DeSEO: Combating search-result poisoning
-
San Francisco, CA, August
-
J. John, F. Yu, Y. Xie, M. Abadi, and A. Krishnamurthy. deSEO: Combating search-result poisoning. In Proc. USENIX Security 2011, San Francisco, CA, August 2011.
-
(2011)
Proc. USENIX Security 2011
-
-
John, J.1
Yu, F.2
Xie, Y.3
Abadi, M.4
Krishnamurthy, A.5
-
11
-
-
70349272437
-
Spamalytics: An empirical analysis of spam marketing conversion
-
Alexandria, VA, October
-
C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage. Spamalytics: An empirical analysis of spam marketing conversion. In Proc. ACM CCS 2008, Alexandria, VA, October 2008.
-
(2008)
Proc. ACM CCS 2008
-
-
Kanich, C.1
Kreibich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.5
Paxson, V.6
Savage, S.7
-
12
-
-
84910665826
-
-
October
-
E. Kao. Making search more secure, October 2011. http://googleblog.blogspot.com/2011/10/making-search-more-secure.html.
-
(2011)
Making Search More Secure
-
-
Kao, E.1
-
15
-
-
84888088814
-
Measuring and analyzing search-redirection attacks in the illicit online prescription drug trade
-
San Francisco, CA, August
-
N. Leontiadis, T. Moore, and N. Christin. Measuring and analyzing search-redirection attacks in the illicit online prescription drug trade. In Proc. USENIX Security 2011, San Francisco, CA, August 2011.
-
(2011)
Proc. USENIX Security 2011
-
-
Leontiadis, N.1
Moore, T.2
Christin, N.3
-
16
-
-
84879759416
-
Pick your poison: Pricing and inventories at unlicensed online pharmacies
-
Philadelphia, PA, June
-
N. Leontiadis, T. Moore, and N. Christin. Pick your poison: Pricing and inventories at unlicensed online pharmacies. In Proc. ACM EC, pages 621-638, Philadelphia, PA, June 2013.
-
(2013)
Proc. ACM EC
, pp. 621-638
-
-
Leontiadis, N.1
Moore, T.2
Christin, N.3
-
17
-
-
80051960199
-
Click trajectories: End-to-end analysis of the spam value chain
-
Oakland, CA, May
-
K. Levchenko, N. Chachra, B. Enright, M. Felegyhazi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, D. McCoy, A. Pitsillidis, N. Weaver, V. Paxson, G. Voelker, and S. Savage. Click trajectories: End-to-end analysis of the spam value chain. In Proc. 2011 IEEE Symposium on Security and Privacy, Oakland, CA, May 2011.
-
(2011)
Proc. 2011 IEEE Symposium on Security and Privacy
-
-
Levchenko, K.1
Chachra, N.2
Enright, B.3
Felegyhazi, M.4
Grier, C.5
Halvorson, T.6
Kanich, C.7
Kreibich, C.8
Liu, H.9
McCoy, D.10
Pitsillidis, A.11
Weaver, N.12
Paxson, V.13
Voelker, G.14
Savage, S.15
-
18
-
-
84910665242
-
Hunting the red fox online: Understanding and detection of mass redirect-script injections
-
San Jose, CA, May
-
Z. Li, S. Alrwais, X. Wang, and E. Alowaisheq. Hunting the red fox online: Understanding and detection of mass redirect-script injections. In Proc. 2014 IEEE Symposium on Security and Privacy, San Jose, CA, May 2014.
-
(2014)
Proc. 2014 IEEE Symposium on Security and Privacy
-
-
Li, Z.1
Alrwais, S.2
Wang, X.3
Alowaisheq, E.4
-
20
-
-
80755169472
-
SURF: Detecting and measuring search poisoning
-
Chicago, IL, October
-
L. Lu, R. Perdisci, and W. Lee. SURF: Detecting and measuring search poisoning. In Proc. ACM CCS 2011, Chicago, IL, October 2011.
-
(2011)
Proc. ACM CCS 2011
-
-
Lu, L.1
Perdisci, R.2
Lee, W.3
-
21
-
-
84900789776
-
Pharmaleaks: Understanding the business of online pharmaceutical affiliate programs
-
Bellevue, WA, August
-
D. McCoy, A. Pitsillidis, G. Jordan, N. Weaver, C. Kreibich, B. Krebs, G. Voelker, S. Savage, and K. Levchenko. Pharmaleaks: Understanding the business of online pharmaceutical affiliate programs. In Proc. USENIX Security 2012, Bellevue, WA, August 2012.
-
(2012)
Proc. USENIX Security 2012
-
-
McCoy, D.1
Pitsillidis, A.2
Jordan, G.3
Weaver, N.4
Kreibich, C.5
Krebs, B.6
Voelker, G.7
Savage, S.8
Levchenko, K.9
-
22
-
-
80755144007
-
Fashion crimes: Trending-term exploitation on the web
-
Chicago, IL, October
-
T. Moore, N. Leontiadis, and N. Christin. Fashion crimes: Trending-term exploitation on the web. In Proc. ACM CCS 2011, Chicago, IL, October 2011.
-
(2011)
Proc. ACM CCS 2011
-
-
Moore, T.1
Leontiadis, N.2
Christin, N.3
-
25
-
-
84910659777
-
Automatically detecting vulnerable websites before they turn malicious
-
San Diego, CA, August
-
K. Soska and N. Christin. Automatically detecting vulnerable websites before they turn malicious. In Proc. USENIX Security 2014, San Diego, CA, August 2014.
-
(2014)
Proc. USENIX Security 2014
-
-
Soska, K.1
Christin, N.2
-
28
-
-
84910151319
-
Search + seizure: The effectiveness of interventions on seo campaigns
-
Vancouver, BC, Canada, November
-
D. Wang, M. Der, M. Karami, L. Saul, D. McCoy, S. Savage, and G. Voelker. Search + seizure: The effectiveness of interventions on seo campaigns. In Proc. ACM IMC'14, Vancouver, BC, Canada, November 2014.
-
(2014)
Proc. ACM IMC'14
-
-
Wang, D.1
Der, M.2
Karami, M.3
Saul, L.4
McCoy, D.5
Savage, S.6
Voelker, G.7
-
29
-
-
84910138572
-
Juice: A longitudinal study of an SEO botnet
-
San Diego, CA, February
-
D. Wang, G. Voelker, and S. Savage. Juice: A longitudinal study of an SEO botnet. In Proc. NDSS'13, San Diego, CA, February 2013.
-
(2013)
Proc. NDSS'13
-
-
Wang, D.1
Voelker, G.2
Savage, S.3
|