-
3
-
-
85076266154
-
-
Norton safe web. http://safeweb.norton.com.
-
-
-
-
6
-
-
38149089416
-
Automated classification and analysis of internet malware
-
Gold Coast, Australia
-
M. Bailey, J. Oberheide, J. Andersen, Z. Mao, F. Jahanian, and J. Nazario. Automated classification and analysis of internet malware. In Proc. RAID'07, pages 178-197, Gold Coast, Australia, 2007.
-
(2007)
Proc. RAID'07
, pp. 178-197
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.4
Jahanian, F.5
Nazario, J.6
-
7
-
-
77955038057
-
Scalable, behavior-based malware clustering
-
San Diego, CA, February
-
U. Bayer, P. Comparetti, C. Hlauschek, C. Kruegel, and E. Kirda. Scalable, behavior-based malware clustering. In Proc. NDSS'09, San Diego, CA, February 2009.
-
(2009)
Proc. NDSS'09
-
-
Bayer, U.1
Comparetti, P.2
Hlauschek, C.3
Kruegel, C.4
Kirda, E.5
-
8
-
-
84889006370
-
Delta: Automatic identification of Unknown web-based infection campaigns
-
Berlin, Germany, November
-
K. Borgolte, C. Kruegel, and G. Vigna. Delta: automatic identification of unknown web-based infection campaigns. In Proc. ACM CCS'13, pages 109-120, Berlin, Germany, November 2013.
-
(2013)
Proc. ACM CCS'13
, pp. 109-120
-
-
Borgolte, K.1
Kruegel, C.2
Vigna, G.3
-
9
-
-
0032670943
-
Web caching and zipf-like distributions: Evidence and implications
-
New York, NY, March
-
L. Breslau, P. Cao, L. Fan, G. Philips, and S. Shenker. Web caching and Zipf-like distributions: Evidence and implications. In Proc. IEEE INFOCOM'99, pages 126-134, New York, NY, March 1999.
-
(1999)
Proc. IEEE INFOCOM'99
, pp. 126-134
-
-
Breslau, L.1
Cao, P.2
Fan, L.3
Philips, G.4
Shenker, S.5
-
10
-
-
35348883378
-
Pagelevel template detection via isotonic smoothing
-
Banff, Canada, May
-
D. Chakrabarti, R. Kumar, and K. Punera. Pagelevel template detection via isotonic smoothing. In Proc. WWW'07, pages 61-70, Banff, Canada, May 2007.
-
(2007)
Proc. WWW'07
, pp. 61-70
-
-
Chakrabarti, D.1
Kumar, R.2
Punera, K.3
-
11
-
-
33947621611
-
Automatic identification of informative sections of web pages
-
S. Debnath, P. Mitra, N. Pal, and C.L. Giles. Automatic identification of informative sections of web pages. IEEE Transactions on Knowledge and Data Engineering, 17(9):1233-1246, 2005.
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.9
, pp. 1233-1246
-
-
Debnath, S.1
Mitra, P.2
Pal, N.3
Giles, C.L.4
-
12
-
-
2942731012
-
An extensive empirical study of feature selection metrics for text classification
-
G. Forman. An extensive empirical study of feature selection metrics for text classification. The Journal of machine learning research, 3:1289-1305, 2003.
-
(2003)
The Journal of Machine Learning Research
, vol.3
, pp. 1289-1305
-
-
Forman, G.1
-
13
-
-
70449102582
-
A general framework for mining concept-drifting data streams with skewed distributions
-
Mineapolis, MN, April
-
J. Gao, W. Fan, J. Han, and P. Yu. A general framework for mining concept-drifting data streams with skewed distributions. In Proc. SIAM SDM'07, pages 3-14, Mineapolis, MN, April 2007.
-
(2007)
Proc. SIAM SDM'07
, pp. 3-14
-
-
Gao, J.1
Fan, W.2
Han, J.3
Yu, P.4
-
15
-
-
84870640932
-
Evilseed: A guided approach to finding Malicious web pages
-
San Francisco, CA, May
-
L. Invernizzi, P. Comparetti, S. Benvenuti, C. Kruegel, M. Cova, and G. Vigna. Evilseed: A guided approach to finding malicious web pages. In Proc. 2012 IEEE Symp. Sec. & Privacy, pages 428-442, San Francisco, CA, May 2012.
-
(2012)
Proc. 2012 IEEE Symp. Sec. & Privacy
, pp. 428-442
-
-
Invernizzi, L.1
Comparetti, P.2
Benvenuti, S.3
Kruegel, C.4
Cova, M.5
Vigna, G.6
-
16
-
-
80755168347
-
Bit-shred: Feature hashing malware for scalable triage and semantic analysis
-
Chicago, IL, October
-
J. Jang, D. Brumley, and S. Venkataraman. Bit-shred: Feature hashing malware for scalable triage and semantic analysis. In Proc. ACM CCS'11, Chicago, IL, October 2011.
-
(2011)
Proc. ACM CCS'11
-
-
Jang, J.1
Brumley, D.2
Venkataraman, S.3
-
17
-
-
85076487784
-
deSEO: Combating search-result poisoning
-
San Francisco, CA, August
-
J. John, F. Yu, Y. Xie, M. Abadi, and A. Krishnamurthy. deSEO: Combating search-result poisoning. In Proc. USENIX Security'11, San Francisco, CA, August 2011.
-
(2011)
Proc. USENIX Security'11
-
-
John, J.1
Yu, F.2
Xie, Y.3
Abadi, M.4
Krishnamurthy, A.5
-
18
-
-
34748854211
-
Using google hacking to enhance defense strategies
-
L. Lancor and R. Workman. Using Google hacking to enhance defense strategies. ACM SIGCSE Bulletin, 39(1):491-495, 2007.
-
(2007)
ACM SIGCSE Bulletin
, vol.39
, Issue.1
, pp. 491-495
-
-
Lancor, L.1
Workman, R.2
-
19
-
-
85076288443
-
A nearly four-year longitudinal study of search-engine poisoning
-
Carnegie Mellon University. July
-
N. Leontiadis, T. Moore, and N. Christin. A nearly four-year longitudinal study of search-engine poisoning. Tech. Rep. CyLab-14-008, Carnegie Mellon University. July 2014.
-
(2014)
Tech. Rep. CyLab-14-008
-
-
Leontiadis, N.1
Moore, T.2
Christin, N.3
-
20
-
-
84888088814
-
Measuring and analyzing search-redirection attacks in the illicit online prescription drug trade
-
San Francisco, CA, August
-
N. Leontiadis, T. Moore, and N. Christin. Measuring and analyzing search-redirection attacks in the illicit online prescription drug trade. In Proc. USENIX Security'11, San Francisco, CA, August 2011.
-
(2011)
Proc. USENIX Security'11
-
-
Leontiadis, N.1
Moore, T.2
Christin, N.3
-
21
-
-
80051960199
-
Click trajectories: End-to-end analysis of the spam value chain
-
Oakland, CA, May
-
K. Levchenko, N. Chachra, B. Enright, M. Felegyhazi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, D. McCoy, A. Pitsillidis, N. Weaver, V. Paxson, G. Voelker, and S. Savage. Click trajectories: End-to-end analysis of the spam value chain. In Proc. 2011 IEEE Symp. Sec. & Privacy, Oakland, CA, May 2011.
-
(2011)
Proc. 2011 IEEE Symp. Sec. & Privacy
-
-
Levchenko, K.1
Chachra, N.2
Enright, B.3
Felegyhazi, M.4
Grier, C.5
Halvorson, T.6
Kanich, C.7
Kreibich, C.8
Liu, H.9
McCoy, D.10
Pitsillidis, A.11
Weaver, N.12
Paxson, V.13
Voelker, G.14
Savage, S.15
-
22
-
-
80755169472
-
SURF: Detecting and measuring search poisoning
-
Chicago, IL, October
-
L. Lu, R. Perdisci, and W. Lee. SURF: Detecting and measuring search poisoning. In Proc. ACM CCS 2011, Chicago, IL, October 2011.
-
(2011)
Proc. ACM CCS 2011
-
-
Lu, L.1
Perdisci, R.2
Lee, W.3
-
23
-
-
85062787688
-
-
hphosts online
-
MalwareBytes. hphosts online. http://www.hosts-file.net/.
-
MalwareBytes
-
-
-
24
-
-
85067544379
-
-
McAfee
-
McAfee. Site Advisor. http://www.siteadvisor.com/.
-
Site Advisor
-
-
-
25
-
-
84900789776
-
Pharmaleaks: Understanding the business of online pharmaceutical affiliate programs
-
Bellevue, WA, August
-
D. McCoy, A. Pitsillidis, G. Jordan, N. Weaver, C. Kreibich, B. Krebs, G. Voelker, S. Savage, and K. Levchenko. Pharmaleaks: Understanding the business of online pharmaceutical affiliate programs. In Proc. USENIX Security'12, Bellevue, WA, August 2012.
-
(2012)
Proc. USENIX Security'12
-
-
McCoy, D.1
Pitsillidis, A.2
Jordan, G.3
Weaver, N.4
Kreibich, C.5
Krebs, B.6
Voelker, G.7
Savage, S.8
Levchenko, K.9
-
28
-
-
85076302871
-
-
PhishTank. https://www.phishtank.com/.
-
-
-
-
29
-
-
80053650188
-
All your iFrames point to us
-
San Jose, CA, August
-
N. Provos, P. Mavrommatis, M. Rajab, and F. Monrose. All your iFrames point to us. In Proc. USENIX Security'08, San Jose, CA, August 2008.
-
(2008)
Proc. USENIX Security'08
-
-
Provos, N.1
Mavrommatis, P.2
Rajab, M.3
Monrose, F.4
-
30
-
-
0035283313
-
Robust classification for imprecise environments
-
Foster Provost and Tom Fawcett. Robust classification for imprecise environments. Machine Learning, 42(3):203-231, 2001.
-
(2001)
Machine Learning
, vol.42
, Issue.3
, pp. 203-231
-
-
Provost, F.1
Fawcett, T.2
-
32
-
-
18744381159
-
Learning block importance models for web pages
-
New York, NY, May
-
Ruihua Song, Haifeng Liu, Ji-Rong Wen, and Wei-Ying Ma. Learning block importance models for web pages. In Proc. WWW'04, pages 203-211, New York, NY, May 2004.
-
(2004)
Proc. WWW'04
, pp. 203-211
-
-
Song, R.1
Liu, H.2
Wen, J.-R.3
Ma, W.-Y.4
-
33
-
-
84893447745
-
-
Sophos. Security threat report 2013, 2013. http://www.sophos.com/en-us/medialibrary/PDFs/other/sophossecuritythreatreport2013.pdf.
-
(2013)
Security Threat Report 2013
-
-
-
34
-
-
33748273704
-
-
The Internet Archive. Wayback machine. https://archive.org/web/.
-
Wayback Machine
-
-
-
35
-
-
84910642482
-
Identifying risk factors for webserver compromise
-
Accra Beach, Barbados, February
-
M. Vasek and T. Moore. Identifying Risk Factors for Webserver Compromise. In Proc. Financial Crypto.'14, Accra Beach, Barbados, February 2014.
-
(2014)
Proc. Financial Crypto.'14
-
-
Vasek, M.1
Moore, T.2
-
36
-
-
84910138572
-
Juice: A longitudinal study of an SEO botnet
-
San Diego, CA, February
-
D. Wang, G. Voelker, and S. Savage. Juice: A longitudinal study of an SEO botnet. In Proc. NDSS'13, San Diego, CA, February 2013.
-
(2013)
Proc. NDSS'13
-
-
Wang, D.1
Voelker, G.2
Savage, S.3
-
37
-
-
0030126609
-
Learning in the presence of concept drift and hidden contexts
-
G. Widmer and M. Kubat. Learning in the presence of concept drift and hidden contexts. Machine learning, 01:69-101, 1996.
-
(1996)
Machine Learning
, vol.1
, pp. 69-101
-
-
Widmer, G.1
Kubat, M.2
-
38
-
-
77952370025
-
Eliminating noisy information in web pages for data mining
-
Washington, DC, August
-
L. Yi, B. Liu, and X. Li. Eliminating noisy information in web pages for data mining. In Proc. ACM KDD'03, pages 296-305, Washington, DC, August 2003.
-
(2003)
Proc. ACM KDD'03
, pp. 296-305
-
-
Yi, L.1
Liu, B.2
Li, X.3
-
39
-
-
33744821948
-
Web data extraction based on partial tree alignment
-
Chiba, Japan, May
-
Y. Zhai and B. Liu. Web data extraction based on partial tree alignment. In Proc. WWW'05, pages 76-85, Chiba, Japan, May 2005.
-
(2005)
Proc. WWW'05
, pp. 76-85
-
-
Zhai, Y.1
Liu, B.2
|