-
1
-
-
84893083291
-
-
Better Security through Software. http://www.facebook.com/notes/facebook/better-security-through-software/248766257130, 2010.
-
(2010)
Better Security Through Software
-
-
-
3
-
-
84910647281
-
-
Working Together to Keep You Secure. http://www.facebook.com/notes/facebook/working-together-to-keep-you-secure/68886667130, 2010.
-
(2010)
Working Together to Keep You Secure
-
-
-
4
-
-
84870631425
-
-
Amazon EC2 Pricing. http://aws.amazon.com/ec2/pricing/, 2013.
-
(2013)
Amazon EC2 Pricing
-
-
-
5
-
-
84904340086
-
-
Apache Giraph. http://giraph.apache.org/, 2013.
-
(2013)
Apache Giraph
-
-
-
6
-
-
84888107606
-
-
Apache Hadoop. http://hadoop.apache.org/, 2013.
-
(2013)
Apache Hadoop
-
-
-
11
-
-
84904279917
-
-
Scaling Apache Giraph to a trillion edges. https://www.facebook.com/notes/facebook-engineering/scaling-apache-giraph-to-atrillion-edges/10151617006153920, 2013.
-
(2013)
Scaling Apache Giraph to A Trillion Edges
-
-
-
13
-
-
84910624800
-
-
Rate Limiting at Facebook. https://developers.facebook.com/docs/reference/ads-api/api-rate-limiting, 2014.
-
(2014)
Rate Limiting at Facebook
-
-
-
14
-
-
84910618769
-
-
Rate Limiting at Google+. https://developers.google.com/+/domains/faq, 2014.
-
(2014)
Rate Limiting at Google+
-
-
-
16
-
-
84893095820
-
CopyCatch: Stopping group attacks by spotting lockstep behavior in social networks
-
A. Beutel, W. Xu, V. Guruswami, C. Palow, and C. Faloutsos. CopyCatch: Stopping Group Attacks by Spotting Lockstep Behavior in Social Networks. In Proceedings of the 22nd International Conference on World Wide Web (WWW), 2013.
-
(2013)
Proceedings of the 22nd International Conference on World Wide Web ( WWW
-
-
Beutel, A.1
Xu, W.2
Guruswami, V.3
Palow, C.4
Faloutsos, C.5
-
17
-
-
84865622599
-
All your contacts are belong to us: Automated identity theft attacks on social networks
-
L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In WWW, 2009.
-
(2009)
WWW
-
-
Bilge, L.1
Strufe, T.2
Balzarotti, D.3
Kirda, E.4
-
18
-
-
84910643141
-
-
University of St Andrews thesis. University of St Andrews
-
F. Brunk. Intersection Problems in Combinatorics. University of St Andrews thesis. University of St Andrews, 2009.
-
(2009)
Intersection Problems in Combinatorics
-
-
Brunk, F.1
-
19
-
-
85015988583
-
Aiding the detection of fake accounts in large scale social online services
-
Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro. Aiding the Detection of Fake Accounts in Large Scale Social Online Services. In NSDI, 2012.
-
(2012)
NSDI
-
-
Cao, Q.1
Sirivianos, M.2
Yang, X.3
Pregueiro, T.4
-
20
-
-
84904429895
-
COMPA: Detecting compromised accounts on social networks
-
M. Egele, G. Stringhini, C. Krügel, and G. Vigna. COMPA: Detecting Compromised Accounts on Social Networks. In NDSS, 2013.
-
(2013)
NDSS
-
-
Egele, M.1
Stringhini, G.2
Krügel, C.3
Vigna, G.4
-
21
-
-
85075837457
-
BotMiner: Clustering analysis of network traffic for protocol-and structure-independent botnet detection
-
G. Gu, R. Perdisci, J. Zhang, and W. Lee. BotMiner: Clustering Analysis of Network Traffic for Protocol-and Structure-Independent Botnet Detection. In USENIX SECURITY, 2008.
-
(2008)
USENIX Security
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
22
-
-
85175133385
-
BotSniffer: Detecting botnet command and control channels in network traffic
-
G. Gu, J. Zhang, and W. Lee. BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic. In NDSS, 2008.
-
(2008)
NDSS
-
-
Gu, G.1
Zhang, J.2
Lee, W.3
-
23
-
-
85041447270
-
Detecting spammers with snare: Spatio-temporal network-level automatic reputation engine
-
S. Hao, N. A. Syed, N. Feamster, A. G. Gray, and S. Krasser. Detecting Spammers with SNARE: Spatio-Temporal Network-Level Automatic Reputation Engine. In USENIX SECURITY, 2009.
-
(2009)
USENIX Security
-
-
Hao, S.1
Syed, N.A.2
Feamster, N.3
Gray, A.G.4
Krasser, S.5
-
24
-
-
84980090975
-
The distribution of the flora in the alpine zone
-
P. Jaccard. The Distribution of the Flora in the Alpine Zone. New Phytologist, 11(2), 1912.
-
(1912)
New Phytologist
, vol.11
, Issue.2
-
-
Jaccard, P.1
-
25
-
-
34848911641
-
Social phishing
-
T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer. Social Phishing. Communications of the ACM, 50(10), 2007.
-
(2007)
Communications of the ACM
, vol.50
, Issue.10
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobsson, M.3
Menczer, F.4
-
29
-
-
67149084291
-
Clustering high-dimensional data: A survey on subspace clustering, pattern-based clustering, and correlation clustering
-
H.-P. Kriegel, P. Kröger, and A. Zimek. Clustering High-Dimensional Data: A Survey on Subspace Clustering, Pattern-Based Clustering, and Correlation Clustering. ACM Trans. Knowl. Discov. Data, 3(1), 2009.
-
(2009)
ACM Trans. Knowl. Discov. Data
, vol.3
, Issue.1
-
-
Kriegel, H.-P.1
Kröger, P.2
Zimek, A.3
-
30
-
-
77954723629
-
Pregel: A system for large-scale graph processing
-
G. Malewicz, M. H. Austern, A. J. Bik, J. C. Dehnert, I. Horn, N. Leiser, and G. Czajkowski. Pregel: a System for Large-Scale Graph Processing. In SIGMOD, 2010.
-
(2010)
SIGMOD
-
-
Malewicz, G.1
Austern, M.H.2
Bik, A.J.3
Dehnert, J.C.4
Horn, I.5
Leiser, N.6
Czajkowski, G.7
-
32
-
-
0042474173
-
Internet quarantine: Requirements for containing self-propagating code
-
D. Moore, C. Shannon, G. M. Voelker, and S. Savage. Internet Quarantine: Requirements for Containing Self-Propagating Code. In INFOCOM, 2003.
-
(2003)
INFOCOM
-
-
Moore, D.1
Shannon, C.2
Voelker, G.M.3
Savage, S.4
-
33
-
-
84856151953
-
Dirty jobs: The role of freelance labor in web service abuse
-
M. Motoyama, D. McCoy, K. Levchenko, S. Savage, and G. M. Voelker. Dirty Jobs: the Role of Freelance Labor in Web Service Abuse. In USENIX SECURITY, 2011.
-
(2011)
USENIX Security
-
-
Motoyama, M.1
McCoy, D.2
Levchenko, K.3
Savage, S.4
Voelker, G.M.5
-
34
-
-
85074591232
-
Scaling memcache at facebook
-
R. Nishtala, H. Fugal, S. Grimm, M. Kwiatkowski, H. Lee, H. C. Li, R. McElroy, M. Paleczny, D. Peek, P. Saab, D. Stafford, T. Tung, and V. Venkataramani. Scaling Memcache at Facebook. In NSDI, 2013.
-
(2013)
NSDI
-
-
Nishtala, R.1
Fugal, H.2
Grimm, S.3
Kwiatkowski, M.4
Lee, H.5
Li, H.C.6
McElroy, R.7
Paleczny, M.8
Peek, D.9
Saab, P.10
Stafford, D.11
Tung, T.12
Venkataramani, V.13
-
36
-
-
82955161550
-
Suspended accounts in retrospect: An analysis of twitter spam
-
K. Thomas, C. Grier, D. Song, and V. Paxson. Suspended accounts in retrospect: An analysis of twitter spam. In IMC, 2011.
-
(2011)
IMC
-
-
Thomas, K.1
Grier, C.2
Song, D.3
Paxson, V.4
-
37
-
-
84890018962
-
Trafficking fraudulent accounts: The role of the underground market in twitter spam and abuse
-
K. Thomas, D. McCoy, C. Grier, A. Kolcz, and V. Paxson. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. In USENIX SECURITY, 2013.
-
(2013)
USENIX Security
-
-
Thomas, K.1
McCoy, D.2
Grier, C.3
Kolcz, A.4
Paxson, V.5
-
38
-
-
77954709174
-
Data warehousing and analytics infrastructure at facebook
-
A. Thusoo, Z. Shao, S. Anthony, D. Borthakur, N. Jain, J. Sen Sarma, R. Murthy, and H. Liu. Data Warehousing and Analytics Infrastructure at Facebook. In SIGMOD, 2010.
-
(2010)
SIGMOD
-
-
Thusoo, A.1
Shao, Z.2
Anthony, S.3
Borthakur, D.4
Jain, N.5
Sen Sarma, J.6
Murthy, R.7
Liu, H.8
-
42
-
-
85076287406
-
You are how you click: Clickstream analysis for sybil detection
-
G. Wang, T. Konolige, C. Wilson, X. Wang, H. Zheng, and B. Y. Zhao. You are How You Click: Clickstream Analysis for Sybil Detection. In USENIX SECURITY, 2013.
-
(2013)
USENIX Security
-
-
Wang, G.1
Konolige, T.2
Wilson, C.3
Wang, X.4
Zheng, H.5
Zhao, B.Y.6
-
43
-
-
58449122201
-
Spamming botnets: Signatures and characteristics
-
Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov. Spamming Botnets: Signatures and Characteristics. In SIGCOMM, 2008.
-
(2008)
SIGCOMM
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
-
44
-
-
82955161549
-
Uncovering social network sybils in the wild
-
Z. Yang, C. Wilson, X. Wang, T. Gao, B. Y. Zhao, and Y. Dai. Uncovering Social Network Sybils in the Wild. In IMC, 2011.
-
(2011)
IMC
-
-
Yang, Z.1
Wilson, C.2
Wang, X.3
Gao, T.4
Zhao, B.Y.5
Dai, Y.6
-
45
-
-
70449694823
-
SybilLimit: A near-optimal social network defense against sybil attacks
-
H. Yu, P. Gibbons, M. Kaminsky, and F. Xiao. SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks. In IEEE S&P, 2008.
-
(2008)
IEEE S&P
-
-
Yu, H.1
Gibbons, P.2
Kaminsky, M.3
Xiao, F.4
-
46
-
-
35548992569
-
SybilGuard: Defending against sybil attacks via social networks
-
H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. SybilGuard: Defending Against Sybil Attacks via Social Networks. In SIGCOMM, 2006.
-
(2006)
SIGCOMM
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
-
47
-
-
79954733367
-
BotGraph: Large scale spamming botnet detection
-
Y. Zhao, Y. Xie, F. Yu, Q. Ke, Y. Yu, Y. Chen, and E. Gillum. BotGraph: Large Scale Spamming Botnet Detection. In NSDI, 2009.
-
(2009)
NSDI
-
-
Zhao, Y.1
Xie, Y.2
Yu, F.3
Ke, Q.4
Yu, Y.5
Chen, Y.6
Gillum, E.7
|