메뉴 건너뛰기




Volumn , Issue , 2015, Pages 324-329

PharmaGuard: Automatic identification of illegal search-indexed online pharmacies

Author keywords

Detection of Illegal Pharmacies; Human Machine Interaction; Pattern Classification; Search Engines

Indexed keywords

AUTOMATION; CRIME; PATTERN RECOGNITION; SEARCH ENGINES; WEBSITES;

EID: 84947996088     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CYBConf.2015.7175954     Document Type: Conference Paper
Times cited : (7)

References (23)
  • 1
    • 15044342970 scopus 로고    scopus 로고
    • Counterfeit pharmaceuticals: Murder by medicine
    • P. Aldhous, "Counterfeit pharmaceuticals: Murder by medicine," Nature, vol. 434, pp. 132-136, 2005.
    • (2005) Nature , vol.434 , pp. 132-136
    • Aldhous, P.1
  • 7
    • 84907029448 scopus 로고    scopus 로고
    • Knock it off: Profiling the online storefronts of counterfeit merchandise
    • New York, NY, USA: ACM
    • M. F. Der, L. K. Saul, S. Savage, and G. M. Voelker, "Knock it off: Profiling the online storefronts of counterfeit merchandise," in Proceedings of the 20th ACM SIGKDD, ser. KDD '14. New York, NY, USA: ACM, 2014, pp. 1759-1768.
    • (2014) Proceedings of the 20th ACM SIGKDD, Ser. KDD '14 , pp. 1759-1768
    • Der, M.F.1    Saul, L.K.2    Savage, S.3    Voelker, G.M.4
  • 8
    • 84898048028 scopus 로고    scopus 로고
    • Use of silk road, the online drug marketplace, in the United Kingdom, Australia and the United States
    • M. J. Barratt, J. A. Ferris, and A. R. Winstock, "Use of silk road, the online drug marketplace, in the united kingdom, australia and the united states," Addiction, vol. 109, no. 5, pp. 774-783, 2014.
    • (2014) Addiction , vol.109 , Issue.5 , pp. 774-783
    • Barratt, M.J.1    Ferris, J.A.2    Winstock, A.R.3
  • 11
    • 84867871313 scopus 로고    scopus 로고
    • Poisonamplifier: A guided approach of discovering compromised websites through reversing search poisoning attacks
    • Springer
    • J. Zhang, C. Yang, Z. Xu, and G. Gu, "Poisonamplifier: A guided approach of discovering compromised websites through reversing search poisoning attacks," in RAID, ser. LNCS, Springer, 2012, vol. 7462, pp. 230-253.
    • (2012) RAID, Ser. LNCS , vol.7462 , pp. 230-253
    • Zhang, J.1    Yang, C.2    Xu, Z.3    Gu, G.4
  • 12
    • 84910154693 scopus 로고    scopus 로고
    • A nearly four-year longitudinal study of search-engine poisoning
    • New York, NY, USA: ACM
    • N. Leontiadis, T. Moore, and N. Christin, "A nearly four-year longitudinal study of search-engine poisoning," in Proc. of ACM CCS. New York, NY, USA: ACM, 2014, pp. 930-941.
    • (2014) Proc. of ACM CCS , pp. 930-941
    • Leontiadis, N.1    Moore, T.2    Christin, N.3
  • 13
    • 80755144007 scopus 로고    scopus 로고
    • Fashion crimes: Trendingterm exploitation on the web
    • New York, NY, USA: ACM
    • T. Moore, N. Leontiadis, and N. Christin, "Fashion crimes: Trendingterm exploitation on the web," in Proc. of ACM CCS. New York, NY, USA: ACM, 2011, pp. 455-466.
    • (2011) Proc. of ACM CCS , pp. 455-466
    • Moore, T.1    Leontiadis, N.2    Christin, N.3
  • 15
    • 84871254978 scopus 로고    scopus 로고
    • Detecting fake medical web sites using recursive trust labeling
    • Nov
    • A. Abbasi, F. M. Zahedi, and S. Kaza, "Detecting fake medical web sites using recursive trust labeling," ACM Trans. Inf. Syst., vol. 30, no. 4, pp. 22:1-22:36, Nov. 2012.
    • (2012) ACM Trans. Inf. Syst. , vol.30 , Issue.4 , pp. 221-2236
    • Abbasi, A.1    Zahedi, F.M.2    Kaza, S.3
  • 16
    • 84870640932 scopus 로고    scopus 로고
    • Evilseed: A guided approach to finding malicious web pages
    • Washington, DC, USA: IEEE Computer Society
    • L. Invernizzi, S. Benvenuti, M. Cova, P. M. Comparetti, C. Kruegel, and G. Vigna, "Evilseed: A guided approach to finding malicious web pages," in Proc. of IEEE S&P. Washington, DC, USA: IEEE Computer Society, 2012, pp. 428-442.
    • (2012) Proc. of IEEE S&P , pp. 428-442
    • Invernizzi, L.1    Benvenuti, S.2    Cova, M.3    Comparetti, P.M.4    Kruegel, C.5    Vigna, G.6
  • 17
    • 84887571803 scopus 로고    scopus 로고
    • Webdriver, "Selenium," http://docs. seleniumhq. org/projects/webdriver.
    • Selenium
  • 21
    • 77950795817 scopus 로고    scopus 로고
    • Detecting malicious flux service networks through passive analysis of recursive dns traces
    • Honolulu, Hawaii, USA
    • R. Perdisci, I. Corona, D. Dagon, and W. Lee, "Detecting malicious flux service networks through passive analysis of recursive dns traces," in Proc. of ACSAC, Honolulu, Hawaii, USA, 2009.
    • (2009) Proc. of ACSAC
    • Perdisci, R.1    Corona, I.2    Dagon, D.3    Lee, W.4
  • 22
    • 84864753059 scopus 로고    scopus 로고
    • Early detection of malicious flux networks via large-scale passive dns traffic analysis
    • R. Perdisci, I. Corona, and G. Giacinto, "Early detection of malicious flux networks via large-scale passive dns traffic analysis," IEEE Trans. on Dep. and Secure Comp., vol. 9, no. 5, pp. 714-726, 2012.
    • (2012) IEEE Trans. on Dep. and Secure Comp. , vol.9 , Issue.5 , pp. 714-726
    • Perdisci, R.1    Corona, I.2    Giacinto, G.3
  • 23
    • 33845807390 scopus 로고    scopus 로고
    • Spam filtering based on the analysis of text information embedded into images
    • 12/2006
    • G. Fumera, I. Pillai, and F. Roli, "Spam filtering based on the analysis of text information embedded into images," Journal of Machine Learning Research, vol. 7, pp. 2699-2720, 12/2006 2006.
    • (2006) Journal of Machine Learning Research , vol.7 , pp. 2699-2720
    • Fumera, G.1    Pillai, I.2    Roli, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.