-
1
-
-
84946240736
-
-
Twitter Blog
-
Twitter Blog, Shutting down spammers, < http://blog.twitter.com/2012/04/shutting-down-spammers.html >.
-
Shutting Down Spammers
-
-
-
3
-
-
77956044597
-
Uncovering social spammers: Social honeypots + machine learning
-
K. Lee, J. Caverlee, S. Webb, Uncovering social spammers: social honeypots + machine learning, in: ACM SIGIR Conf., 2010.
-
(2010)
ACM SIGIR Conf
-
-
Lee, K.1
Caverlee, J.2
Webb, S.3
-
5
-
-
84860848688
-
Detecting spammers on Twitter
-
F. Benevenuto, G. Magno, T. Rodrigues, V. Almeida, Detecting spammers on Twitter, in: Collaboration, Electronic messaging, Anti-Abuse and Spam Conf. (CEAS), 2010.
-
(2010)
Collaboration, Electronic Messaging, Anti-Abuse and Spam Conf. (CEAS)
-
-
Benevenuto, F.1
Magno, G.2
Rodrigues, T.3
Almeida, V.4
-
7
-
-
84880557073
-
Empirical evaluation and new design for fighting evolving Twitter spammers
-
C. Yang, R. Harkreader, and G. Gu Empirical evaluation and new design for fighting evolving Twitter spammers IEEE Trans. Inf. Forensics Security 8 8 2013 1280 1293
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.8
, pp. 1280-1293
-
-
Yang, C.1
Harkreader, R.2
Gu, G.3
-
8
-
-
84860872656
-
Analyzing spammers' social networks for fun and profit: A case study of cyber criminal ecosystem on Twitter
-
C. Yang, R. Harkreader, J. Zhang, S. Shin, G. Gu, Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on Twitter, in: Int. World Wide Web Conf. (WWW), 2012.
-
(2012)
Int. World Wide Web Conf. (WWW)
-
-
Yang, C.1
Harkreader, R.2
Zhang, J.3
Shin, S.4
Gu, G.5
-
9
-
-
84871971372
-
Towards online spam filtering in social networks
-
H. Gao, Y. Chen, K. Lee, D. Palsetia, A. Choudhary, Towards online spam filtering in social networks, in: Network and Distributed System Security Symp. (NDSS), 2012.
-
(2012)
Network and Distributed System Security Symp. (NDSS)
-
-
Gao, H.1
Chen, Y.2
Lee, K.3
Palsetia, D.4
Choudhary, A.5
-
10
-
-
80051985554
-
Design and evaluation of a real-time URL spam filtering service
-
K. Thomas, C. Grier, J. Ma, V. Paxson, D. Song, Design and evaluation of a real-time URL spam filtering service, in: IEEE Symp. Security and Privacy (S&P), 2011.
-
(2011)
IEEE Symp. Security and Privacy (S&P)
-
-
Thomas, K.1
Grier, C.2
Ma, J.3
Paxson, V.4
Song, D.5
-
12
-
-
84856151953
-
Dirty jobs: The role of freelance labor in web service abuse
-
M. Motoyama, D. McCoy, K. Levchenko, S. Savage, G.M. Voelker, Dirty jobs: the role of freelance labor in web service abuse, in: USENIX Security Symp., 2011.
-
(2011)
USENIX Security Symp.
-
-
Motoyama, M.1
McCoy, D.2
Levchenko, K.3
Savage, S.4
Voelker, G.M.5
-
13
-
-
84860858213
-
Serf and turf: Crowdturfing for fun and profit
-
G. Wang, C. Wilson, X. Zhao, Y. Zhu, M. Mohanlal, H. Zheng, B.Y. Zhao, Serf and turf: crowdturfing for fun and profit, in: Int. World Wide Web Conf. (WWW), 2012.
-
(2012)
Int. World Wide Web Conf. (WWW)
-
-
Wang, G.1
Wilson, C.2
Zhao, X.3
Zhu, Y.4
Mohanlal, M.5
Zheng, H.6
Zhao, B.Y.7
-
14
-
-
85180412749
-
Social turing tests: Crowdsourcing Sybil detection
-
G. Wang, M. Mohanlal, C. Wilson, X. Wang, M. Metzger, H. Zheng, B.Y. Zhao, Social turing tests: crowdsourcing Sybil detection, in: Network and Distributed System Security Symp. (NDSS), 2013.
-
(2013)
Network and Distributed System Security Symp. (NDSS)
-
-
Wang, G.1
Mohanlal, M.2
Wilson, C.3
Wang, X.4
Metzger, M.5
Zheng, H.6
Zhao, B.Y.7
-
15
-
-
84860775300
-
-
M.A. Rajab, L. Ballard, N. Jagpal, P. Mavrommatis, D. Nojiri, N. Provos, L. Schmidt, Trends in circumventing web-malware detection, Tech. rep., Google, 2011.
-
(2011)
Trends in Circumventing Web-malware Detection, Tech. Rep., Google
-
-
Rajab, M.A.1
Ballard, L.2
Jagpal, N.3
Mavrommatis, P.4
Nojiri, D.5
Provos, N.6
Schmidt, L.7
-
16
-
-
82955161550
-
Suspended accounts in retrospect: An analysis of Twitter spam
-
K. Thomas, C. Grier, V. Paxson, D. Song, Suspended accounts in retrospect: an analysis of Twitter spam, in: ACM Internet Measurement Conf. (IMC), 2011.
-
(2011)
ACM Internet Measurement Conf. (IMC)
-
-
Thomas, K.1
Grier, C.2
Paxson, V.3
Song, D.4
-
17
-
-
78650869579
-
Detecting algorithmically generated malicious domain names
-
S. Yadav, A.K.K. Reddy, A.L.N. Reddy, S. Ranjan, Detecting algorithmically generated malicious domain names, in: ACM Internet Measurement Conf. (IMC), 2010.
-
(2010)
ACM Internet Measurement Conf. (IMC)
-
-
Yadav, S.1
Reddy, A.K.K.2
Reddy, A.L.N.3
Ranjan, S.4
-
18
-
-
84867774439
-
Detecting algorithmically generated domain-flux attacks with DNS traffic analysis
-
S. Yadav, A.K.K. Reddy, A.L.N. Reddy, and S. Ranjan Detecting algorithmically generated domain-flux attacks with DNS traffic analysis IEEE/ACM Trans. Netw. 20 5 2012 1663 1677
-
(2012)
IEEE/ACM Trans. Netw.
, vol.20
, Issue.5
, pp. 1663-1677
-
-
Yadav, S.1
Reddy, A.K.K.2
Reddy, A.L.N.3
Ranjan, S.4
-
19
-
-
85068676628
-
From throw-away traffic to bots: Detecting the rise of DGA-based malware
-
M. Antonakakis, R. Perdisci, Y. Nadji, N. Vasiloglou, S. Abu-Nimeh, W. Lee, D. Dagon, From throw-away traffic to bots: detecting the rise of DGA-based malware, in: USENIX Security Symp., 2012.
-
(2012)
USENIX Security Symp
-
-
Antonakakis, M.1
Perdisci, R.2
Nadji, Y.3
Vasiloglou, N.4
Abu-Nimeh, S.5
Lee, W.6
Dagon, D.7
-
20
-
-
84946240978
-
-
Twitter Blog, #numbers
-
Twitter Blog, #numbers, < http://blog.twitter.com/2011/03/numbers.html >.
-
-
-
-
21
-
-
84873447654
-
Prophiler: A fast filter for the large-scale detection of malicious web pages
-
D. Canali, M. Cova, G. Vigna, C. Kruegel, Prophiler: a fast filter for the large-scale detection of malicious web pages, in: Int. World Wide Web Conf. (WWW), 2011.
-
(2011)
Int. World Wide Web Conf. (WWW)
-
-
Canali, D.1
Cova, M.2
Vigna, G.3
Kruegel, C.4
-
26
-
-
85015988583
-
Aiding the detection of fake accounts in large scale social online services
-
Q. Cao, M. Sirivianos, X. Yang, T. Pregueiro, Aiding the detection of fake accounts in large scale social online services, in: USENIX Symp. Networked Systems Design and Implementation (NSDI), 2012.
-
(2012)
USENIX Symp. Networked Systems Design and Implementation (NSDI)
-
-
Cao, Q.1
Sirivianos, M.2
Yang, X.3
Pregueiro, T.4
-
27
-
-
35548992569
-
SybilGuard: Defending against Sybil attacks via social networks
-
H. Yu, M. Kaminsky, P.B. Gibbons, A. Flaxman, SybilGuard: defending against Sybil attacks via social networks, in: ACM SIGCOMM Conf., 2006.
-
(2006)
ACM SIGCOMM Conf
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
-
28
-
-
45749116664
-
SybilLimit: A near-optimal social network defense against Sybil attacks
-
H. Yu, P.B. Gibbons, M. Kaminsky, F. Xiao, SybilLimit: a near-optimal social network defense against Sybil attacks, in: IEEE Symp. Security and Privacy (S&P), 2008.
-
(2008)
IEEE Symp. Security and Privacy (S&P)
-
-
Yu, H.1
Gibbons, P.B.2
Kaminsky, M.3
Xiao, F.4
-
30
-
-
84887052468
-
Sybil-resilient online content voting
-
D.N. Tran, B. Min, J. Li, L. Subramanian, Sybil-resilient online content voting, in: USENIX Symp. Networked Systems Design and Implementation (NSDI), 2009.
-
(2009)
USENIX Symp. Networked Systems Design and Implementation (NSDI)
-
-
Tran, D.N.1
Min, B.2
Li, J.3
Subramanian, L.4
-
31
-
-
78149337076
-
An analysis of social network-based Sybil defenses
-
B. Viswanath, A. Post, K.P. Gummadi, A. Mislove, An analysis of social network-based Sybil defenses, in: ACM SIGCOMM Conf., 2010.
-
(2010)
ACM SIGCOMM Conf
-
-
Viswanath, B.1
Post, A.2
Gummadi, K.P.3
Mislove, A.4
-
32
-
-
82955161549
-
Uncovering social network Sybils in the wild
-
Z. Yang, C. Wilson, X. Wang, T. Gao, B.Y. Zhao, Y. Dai, Uncovering social network Sybils in the wild, in: ACM Internet Measurement Conf. (IMC), 2011.
-
(2011)
ACM Internet Measurement Conf. (IMC)
-
-
Yang, Z.1
Wilson, C.2
Wang, X.3
Gao, T.4
Zhao, B.Y.5
Dai, Y.6
-
33
-
-
85076287406
-
You are how you click: Clickstream analysis for Sybil detection
-
G. Wang, T. Konolige, C. Wilson, X. Wang, H. Zheng, B.Y. Zhao, You are how you click: clickstream analysis for Sybil detection, in: USENIX Security Symp., 2013.
-
(2013)
USENIX Security Symp
-
-
Wang, G.1
Konolige, T.2
Wilson, C.3
Wang, X.4
Zheng, H.5
Zhao, B.Y.6
|