-
1
-
-
15044342970
-
Counterfeit pharmaceuticals: Murder by medicine
-
P. Aldhous, "Counterfeit pharmaceuticals: Murder by medicine," Nature, vol. 434, pp. 132-136, 2005.
-
(2005)
Nature
, vol.434
, pp. 132-136
-
-
Aldhous, P.1
-
6
-
-
85084095449
-
Spamcraft: An inside look at spam campaign orchestration
-
Berkeley, CA, USA: USENIX Association
-
C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. M. Voelker, V. Paxson, and S. Savage, "Spamcraft: An inside look at spam campaign orchestration," in Proc. of USENIX LEET Berkeley, CA, USA: USENIX Association, 2009.
-
(2009)
Proc. of USENIX LEET
-
-
Kreibich, C.1
Kanich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.M.5
Paxson, V.6
Savage, S.7
-
7
-
-
84907029448
-
Knock it off: Profiling the online storefronts of counterfeit merchandise
-
New York, NY, USA: ACM
-
M. F. Der, L. K. Saul, S. Savage, and G. M. Voelker, "Knock it off: Profiling the online storefronts of counterfeit merchandise," in Proceedings of the 20th ACM SIGKDD, ser. KDD '14. New York, NY, USA: ACM, 2014, pp. 1759-1768.
-
(2014)
Proceedings of the 20th ACM SIGKDD, Ser. KDD '14
, pp. 1759-1768
-
-
Der, M.F.1
Saul, L.K.2
Savage, S.3
Voelker, G.M.4
-
8
-
-
84898048028
-
Use of silk road, the online drug marketplace, in the United Kingdom, Australia and the United States
-
M. J. Barratt, J. A. Ferris, and A. R. Winstock, "Use of silk road, the online drug marketplace, in the united kingdom, australia and the united states," Addiction, vol. 109, no. 5, pp. 774-783, 2014.
-
(2014)
Addiction
, vol.109
, Issue.5
, pp. 774-783
-
-
Barratt, M.J.1
Ferris, J.A.2
Winstock, A.R.3
-
10
-
-
84879759416
-
Pick your poison: Pricing and inventories at unlicensed online pharmacies
-
New York, NY, USA: ACM
-
N. Leontiadis, T. Moore, and N. Christin, "Pick your poison: Pricing and inventories at unlicensed online pharmacies," in Proc. of the ACM Conf. on Electronic Comm., ser. EC '13. New York, NY, USA: ACM, 2013, pp. 621-638.
-
(2013)
Proc. of the ACM Conf. on Electronic Comm., Ser. EC '13
, pp. 621-638
-
-
Leontiadis, N.1
Moore, T.2
Christin, N.3
-
11
-
-
84867871313
-
Poisonamplifier: A guided approach of discovering compromised websites through reversing search poisoning attacks
-
Springer
-
J. Zhang, C. Yang, Z. Xu, and G. Gu, "Poisonamplifier: A guided approach of discovering compromised websites through reversing search poisoning attacks," in RAID, ser. LNCS, Springer, 2012, vol. 7462, pp. 230-253.
-
(2012)
RAID, Ser. LNCS
, vol.7462
, pp. 230-253
-
-
Zhang, J.1
Yang, C.2
Xu, Z.3
Gu, G.4
-
12
-
-
84910154693
-
A nearly four-year longitudinal study of search-engine poisoning
-
New York, NY, USA: ACM
-
N. Leontiadis, T. Moore, and N. Christin, "A nearly four-year longitudinal study of search-engine poisoning," in Proc. of ACM CCS. New York, NY, USA: ACM, 2014, pp. 930-941.
-
(2014)
Proc. of ACM CCS
, pp. 930-941
-
-
Leontiadis, N.1
Moore, T.2
Christin, N.3
-
13
-
-
80755144007
-
Fashion crimes: Trendingterm exploitation on the web
-
New York, NY, USA: ACM
-
T. Moore, N. Leontiadis, and N. Christin, "Fashion crimes: Trendingterm exploitation on the web," in Proc. of ACM CCS. New York, NY, USA: ACM, 2011, pp. 455-466.
-
(2011)
Proc. of ACM CCS
, pp. 455-466
-
-
Moore, T.1
Leontiadis, N.2
Christin, N.3
-
14
-
-
84903821830
-
Evaluating link-based techniques for detecting fake pharmacy websites
-
Phoenix, Arizona, December 14-15
-
A. Abbasi, S. Kaza, and F. M. Zahedi, "Evaluating link-based techniques for detecting fake pharmacy websites," in Annual Workshop on Information Technologies and Systems, Phoenix, Arizona, December 14-15 2009.
-
(2009)
Annual Workshop on Information Technologies and Systems
-
-
Abbasi, A.1
Kaza, S.2
Zahedi, F.M.3
-
15
-
-
84871254978
-
Detecting fake medical web sites using recursive trust labeling
-
Nov
-
A. Abbasi, F. M. Zahedi, and S. Kaza, "Detecting fake medical web sites using recursive trust labeling," ACM Trans. Inf. Syst., vol. 30, no. 4, pp. 22:1-22:36, Nov. 2012.
-
(2012)
ACM Trans. Inf. Syst.
, vol.30
, Issue.4
, pp. 221-2236
-
-
Abbasi, A.1
Zahedi, F.M.2
Kaza, S.3
-
16
-
-
84870640932
-
Evilseed: A guided approach to finding malicious web pages
-
Washington, DC, USA: IEEE Computer Society
-
L. Invernizzi, S. Benvenuti, M. Cova, P. M. Comparetti, C. Kruegel, and G. Vigna, "Evilseed: A guided approach to finding malicious web pages," in Proc. of IEEE S&P. Washington, DC, USA: IEEE Computer Society, 2012, pp. 428-442.
-
(2012)
Proc. of IEEE S&P
, pp. 428-442
-
-
Invernizzi, L.1
Benvenuti, S.2
Cova, M.3
Comparetti, P.M.4
Kruegel, C.5
Vigna, G.6
-
17
-
-
84887571803
-
-
Webdriver, "Selenium," http://docs. seleniumhq. org/projects/webdriver.
-
Selenium
-
-
-
19
-
-
0003922190
-
-
2nd Edition), Wiley, Ed. John Wiley and Sons
-
R. Duda, P. Hart, and D. Stork, Pattern Classification (2nd Edition), Wiley, Ed. John Wiley and Sons, 2000.
-
(2000)
Pattern Classification
-
-
Duda, R.1
Hart, P.2
Stork, D.3
-
21
-
-
77950795817
-
Detecting malicious flux service networks through passive analysis of recursive dns traces
-
Honolulu, Hawaii, USA
-
R. Perdisci, I. Corona, D. Dagon, and W. Lee, "Detecting malicious flux service networks through passive analysis of recursive dns traces," in Proc. of ACSAC, Honolulu, Hawaii, USA, 2009.
-
(2009)
Proc. of ACSAC
-
-
Perdisci, R.1
Corona, I.2
Dagon, D.3
Lee, W.4
-
22
-
-
84864753059
-
Early detection of malicious flux networks via large-scale passive dns traffic analysis
-
R. Perdisci, I. Corona, and G. Giacinto, "Early detection of malicious flux networks via large-scale passive dns traffic analysis," IEEE Trans. on Dep. and Secure Comp., vol. 9, no. 5, pp. 714-726, 2012.
-
(2012)
IEEE Trans. on Dep. and Secure Comp.
, vol.9
, Issue.5
, pp. 714-726
-
-
Perdisci, R.1
Corona, I.2
Giacinto, G.3
-
23
-
-
33845807390
-
Spam filtering based on the analysis of text information embedded into images
-
12/2006
-
G. Fumera, I. Pillai, and F. Roli, "Spam filtering based on the analysis of text information embedded into images," Journal of Machine Learning Research, vol. 7, pp. 2699-2720, 12/2006 2006.
-
(2006)
Journal of Machine Learning Research
, vol.7
, pp. 2699-2720
-
-
Fumera, G.1
Pillai, I.2
Roli, F.3
|