-
1
-
-
84904812103
-
-
Spamhaus dbl. http://www.spamhaus.org.
-
Spamhaus Dbl
-
-
-
2
-
-
34248389195
-
Analysis of communities of interest in data networks
-
AIELLO, W., KALMANEK, C., MCDANIEL, P., SEN, S., SPATSCHECK, O., AND VAN DER MERWE, J. Analysis of communities of interest in data networks. In Passive and Active Network Measurement. 2005.
-
(2005)
Passive and Active Network Measurement
-
-
Aiello, W.1
Kalmanek, C.2
McDaniel, P.3
Sen, S.4
Spatscheck, O.5
Van Der Merwe, J.6
-
3
-
-
84860848688
-
Detecting spammers on twitter
-
BENEVENUTO, F., MAGNO, G., RODRIGUES, T., AND ALMEIDA, V. Detecting Spammers on Twitter. In Conference on Email and Anti-Spam (CEAS) (2010).
-
(2010)
Conference on Email and Anti-Spam (CEAS)
-
-
Benevenuto, F.1
Magno, G.2
Rodrigues, T.3
Almeida, V.4
-
4
-
-
72449133353
-
Detecting spammers and content promoters in online video social networks
-
BENEVENUTO, F., RODRIGUES, T., ALMEIDA, V., ALMEIDA, J., AND GONÇALVES, M. Detecting spammers and content promoters in online video social networks. In ACM SIGIR conference on Research and development in information retrieval (2009).
-
(2009)
ACM SIGIR Conference on Research and Development in Information Retrieval
-
-
Benevenuto, F.1
Rodrigues, T.2
Almeida, V.3
Almeida, J.4
Gonçalves, M.5
-
5
-
-
84865622599
-
All your contacts are belong to us: Automated identity theft attacks on social networks
-
BILGE, L., STRUFE, T., BALZAROTTI, D., AND KIRDA, E. All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In World Wide Web Conference (WWW) (2009).
-
(2009)
World Wide Web Conference (WWW)
-
-
Bilge, L.1
Strufe, T.2
Balzarotti, D.3
Kirda, E.4
-
6
-
-
56349094785
-
Fast unfolding of communities in large networks
-
BLONDEL, V. D., GUILLAUME, J.-L., LAMBIOTTE, R., AND LEFEBVRE, E. Fast unfolding of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment (2008).
-
(2008)
Journal of Statistical Mechanics: Theory and Experiment
-
-
Blondel, V.D.1
Guillaume, J.-L.2
Lambiotte, R.3
Lefebvre, E.4
-
7
-
-
84910660900
-
Uncovering large groups of active malicious accounts in online social networks
-
CAO, Q., YANG, X., YU, J., AND PALOW, C. Uncovering Large Groups of Active Malicious Accounts in Online Social Networks. In ACM Conference on Computer and Communications Security (CCS) (2014).
-
(2014)
ACM Conference on Computer and Communications Security (CCS)
-
-
Cao, Q.1
Yang, X.2
Yu, J.3
Palow, C.4
-
8
-
-
85180813826
-
Pathcutter: Severing the self-propagation path of XSS Javascript worms in social web networks
-
CAO, Y., YEGNESWARAN, V., PORRAS, P., AND CHEN, Y. PathCutter: Severing the Self-Propagation Path of XSS Javascript Worms in Social Web Networks. In Symposium on Network and Distributed System Security (NDSS) (2012).
-
(2012)
Symposium on Network and Distributed System Security (NDSS)
-
-
Cao, Y.1
Yegneswaran, V.2
Porras, P.3
Chen, Y.4
-
9
-
-
84888402098
-
The zombie roundup: Understanding, detecting, and disrupting botnets
-
COOKE, E., JAHANIAN, F., AND MCPHERSON, D. The zombie roundup: Understanding, detecting, and disrupting botnets. In Proceedings of the USENIX SRUTI Workshop (2005).
-
(2005)
Proceedings of the USENIX SRUTI Workshop
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
11
-
-
84904429895
-
COMPA: Detecting compromised accounts on social networks
-
EGELE, M., STRINGHINI, G., KRUEGEL, C., AND VI-GNA, G. Compa: Detecting compromised accounts on social networks. In Symposium on Network and Distributed System Security (NDSS) (2013).
-
(2013)
Symposium on Network and Distributed System Security (NDSS)
-
-
Egele, M.1
Stringhini, G.2
Kruegel, C.3
Vi-Gna, G.4
-
12
-
-
4043066126
-
Spectra of real-world graphs: Beyond the semicircle law
-
FARKAS, I. J., DERÉNYI, I., BARABÁSI, A.-L., AND VICSEK, T. Spectra of real-world graphs: Beyond the semicircle law. Physical Review E (2001).
-
(2001)
Physical Review E
-
-
Farkas, I.J.1
Derényi, I.2
Barabási, A.-L.3
Vicsek, T.4
-
13
-
-
84871971372
-
Towards online spam filtering in social networks
-
GAO, H., CHEN, Y., LEE, K., PALSETIA, D., AND CHOUDHARY, A. Towards Online Spam Filtering in Social Networks. In Symposium on Network and Distributed System Security (NDSS) (2012).
-
(2012)
Symposium on Network and Distributed System Security (NDSS)
-
-
Gao, H.1
Chen, Y.2
Lee, K.3
Palsetia, D.4
Choudhary, A.5
-
14
-
-
78650880229
-
Detecting and characterizing social spam campaigns
-
GAO, H., HU, J., WILSON, C., LI, Z., CHEN, Y., AND ZHAO, B. Detecting and Characterizing Social Spam Campaigns. In Internet Measurement Conference (IMC) (2010).
-
(2010)
Internet Measurement Conference (IMC)
-
-
Gao, H.1
Hu, J.2
Wilson, C.3
Li, Z.4
Chen, Y.5
Zhao, B.6
-
15
-
-
78650005374
-
@Spam: The underground on 140 characters or less
-
GRIER, C., THOMAS, K., PAXSON, V., AND ZHANG, M. @spam: the underground on 140 characters or less. In ACM Conference on Computer and Communications Security (CCS) (2010).
-
(2010)
ACM Conference on Computer and Communications Security (CCS)
-
-
Grier, C.1
Thomas, K.2
Paxson, V.3
Zhang, M.4
-
16
-
-
85041447270
-
Detecting spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine
-
HAO, S., SYED, N. A., FEAMSTER, N., GRAY, A. G., AND KRASSER, S. Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine. In USENIX Security Symposium (2009).
-
(2009)
USENIX Security Symposium
-
-
Hao, S.1
Syed, N.A.2
Feamster, N.3
Gray, A.G.4
Krasser, S.5
-
17
-
-
84929888955
-
Pubcrawl: Protecting users and businesses from crawlers
-
JACOB, G., KIRDA, E., KRUEGEL, C., AND VIGNA, G. Pubcrawl: protecting users and businesses from crawlers. In USENIX Security Symposium (2012).
-
(2012)
USENIX Security Symposium
-
-
Jacob, G.1
Kirda, E.2
Kruegel, C.3
Vigna, G.4
-
18
-
-
34848911641
-
-
JAGATIC, T., JOHNSON, N., JAKOBSSON, M., AND JAGATIF, T. Social Phishing. Comm. ACM 50, 10 (2007), 94–100.
-
(2007)
Social Phishing. Comm. ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.1
Johnson, N.2
Jakobsson, M.3
Jagatif, T.4
-
20
-
-
85081774740
-
Enterprise security: A community of interest based approach
-
MCDANIEL, P. D., SEN, S., SPATSCHECK, O., VAN DER MERWE, J. E., AIELLO, W., AND KALMANEK, C. R. Enterprise Security: A Community of Interest Based Approach. In Symposium on Network and Distributed System Security (NDSS) (2006).
-
(2006)
Symposium on Network and Distributed System Security (NDSS)
-
-
McDaniel, P.D.1
Sen, S.2
Spatscheck, O.3
Van Der Merwe, J.E.4
Aiello, W.5
Kalmanek, C.R.6
-
21
-
-
84893520306
-
A Quantitative Study of Forum Spamming Using Context-based Analysys
-
NIU, Y., WANG, Y., CHEN, H., MA, M., AND HSU, F. A Quantitative Study of Forum Spamming Using Context-based Analysys. In Symposium on Network and Distributed System Security (NDSS) (2007).
-
(2007)
Symposium on Network and Distributed System Security (NDSS)
-
-
Niu, Y.1
Wang, Y.2
Chen, H.3
Ma, M.4
Hsu, F.5
-
22
-
-
82955238527
-
Botnet judo: Fighting spam with itself
-
PITSILLIDIS, A., LEVCHENKO, K., KREIBICH, C., KANICH, C., VOELKER, G. M., PAXSON, V., WEAVER, N., AND SAVAGE, S. botnet Judo: Fighting Spam with Itself. In Symposium on Network and Distributed System Security (NDSS) (2010).
-
(2010)
Symposium on Network and Distributed System Security (NDSS)
-
-
Pitsillidis, A.1
Levchenko, K.2
Kreibich, C.3
Kanich, C.4
Voelker, G.M.5
Paxson, V.6
Weaver, N.7
Savage, S.8
-
25
-
-
0009304541
-
A Bayesian approach to filtering junk email
-
SAHAMI, M., DUMAIS, S., HECKERMANN, D., AND HORVITZ, E. A Bayesian approach to filtering junk email. Learning for Text Categorization (1998).
-
(1998)
Learning for Text Categorization
-
-
Sahami, M.1
Dumais, S.2
Heckermann, D.3
Horvitz, E.4
-
26
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
STONE-GROSS, B., COVA, M., CAVALLARO, L., GILBERT, B., SZYDLOWSKI, M., KEMMERER, R., KRUEGEL, C., AND VIGNA, G. Your Botnet is My Botnet: Analysis of a Botnet Takeover. In ACM Conference on Computer and Communications Security (CCS) (2009).
-
(2009)
ACM Conference on Computer and Communications Security (CCS)
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
29
-
-
80051985554
-
Design and evaluation of a real-time URL spam filtering service
-
THOMAS, K., GRIER, C., MA, J., PAXSON, V., AND SONG, D. Design and Evaluation of a Real-Time URL Spam Filtering Service. In IEEE Symposium on Security and Privacy (2011).
-
(2011)
IEEE Symposium on Security and Privacy
-
-
Thomas, K.1
Grier, C.2
Ma, J.3
Paxson, V.4
Song, D.5
-
30
-
-
84890018962
-
Trafficking fraudulent accounts: The role of the underground market in twitter spam and abuse
-
THOMAS, K. AND MCCOY, D. AND GRIER, C. AND KOLCZ, A. AND PAXSON, V. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. In USENIX Security Symposium (2013).
-
(2013)
USENIX Security Symposium
-
-
Thomas, K.1
McCoy, D.2
Grier, C.3
Kolcz, A.4
Paxson, V.5
-
32
-
-
85076287406
-
You are how you click: Clickstream analysis for sybil detection
-
WANG, G., KONOLIGE, T., WILSON, C., WANG, X., ZHENG, H., AND ZHAO, B. Y. You are how you click: Clickstream analysis for sybil detection. USENIX Security Symposium (2013).
-
(2013)
USENIX Security Symposium
-
-
Wang, G.1
Konolige, T.2
Wilson, C.3
Wang, X.4
Zheng, H.5
Zhao, B.Y.6
-
33
-
-
84860858213
-
Serf and turf: Crowdturfing for fun and profit
-
WANG, G., WILSON, C., ZHAO, X., ZHU, Y., MOHANLAL, M., ZHENG, H., AND ZHAO, B. Y. Serf and turf: crowdturfing for fun and profit. In World Wide Web Conference (WWW) (2012).
-
(2012)
World Wide Web Conference (WWW)
-
-
Wang, G.1
Wilson, C.2
Zhao, X.3
Zhu, Y.4
Mohanlal, M.5
Zheng, H.6
Zhao, B.Y.7
-
34
-
-
65249165325
-
Spamming botnets: Signatures and characteristics
-
XIE, Y., YU, F., ACHAN, K., PANIGRAHY, R., HUL-TEN, G., AND OSIPKOV, I. Spamming Botnets: Signatures and Characteristics. SIGCOMM Comput. Commun. Rev. (2008).
-
(2008)
SIGCOMM Comput. Commun. Rev.
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hul-Ten, G.5
Osipkov, I.6
-
37
-
-
33750285481
-
Sybilguard: Defending against sybil attacks via social networks
-
YU, H., KAMINSKY, M., GIBBONS, P. B., AND FLAX-MAN, A. Sybilguard: defending against sybil attacks via social networks. ACM SIGCOMM Computer Communication Review (2006).
-
(2006)
ACM SIGCOMM Computer Communication Review
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flax-Man, A.4
-
39
-
-
79954733367
-
Botgraph: Large scale spamming botnet detection
-
ZHAO, Y., XIE, Y., YU, F., KE, Q., YU, Y., CHEN, Y., AND GILLUM, E. Botgraph: Large scale spamming botnet detection. In USENIX Symposium on Networked Systems Design and Implementation (NSDI) (2009).
-
(2009)
USENIX Symposium on Networked Systems Design and Implementation (NSDI)
-
-
Zhao, Y.1
Xie, Y.2
Yu, F.3
Ke, Q.4
Yu, Y.5
Chen, Y.6
Gillum, E.7
|