-
1
-
-
85076285153
-
-
Apache Mahout. http://mahout.apache.org/.
-
-
-
-
2
-
-
85076288449
-
-
Facebook Advertisement Value (BBC). http://www.bbc.co.uk/news/technology-18813237.
-
-
-
-
3
-
-
84893095820
-
Copycatch: Stopping group attacks by spotting lockstep behavior in social networks
-
BEUTEL, A., XU, W., GURUSWAMI, V., PALOW, C., and FALOUTSOS, C. Copycatch: Stopping group attacks by spotting lockstep behavior in social networks. In Proc. of WWW (2013).
-
(2013)
Proc. Of WWW
-
-
Beutel, A.1
Xu, W.2
Guruswami, V.3
Palow, C.4
Faloutsos, C.5
-
4
-
-
84899013434
-
Deep twitter diving: Exploring topical groups in microblogs at scale
-
BHATTACHARYA, P., GHOSH, S., KULSHRESTHA, J., MON-DAL, M., ZAFAR, M. B., GANGULY, N., and GUMMADI, K. P. Deep Twitter Diving: Exploring Topical Groups in Microblogs at Scale. In Proc. of CSCW (2014).
-
(2014)
Proc. Of CSCW
-
-
Bhattacharya, P.1
Ghosh, S.2
Kulshrestha, J.3
Mon-Dal, M.4
Zafar, M.B.5
Ganguly, N.6
Gummadi, K.P.7
-
6
-
-
85076269080
-
-
Click Farms (Washington Post). http://www.washingtonpost.com/blogs/wonkblog/wp/2014/01/06/click-farms-are-the-new-sweatshops.
-
-
-
-
9
-
-
34248577801
-
Algorithms for ProjectionPursuit robust principal component analysis
-
CROUX, C., FILZMOSER, P., and OLIVEIRA, M. Algorithms for ProjectionPursuit Robust Principal Component Analysis. Journal of Chemometrics and Intelligent Laboratory Systems 87, 2 (2007).
-
(2007)
Journal of Chemometrics and Intelligent Laboratory Systems
, vol.87
, pp. 2
-
-
Croux, C.1
Filzmoser, P.2
Oliveira, M.3
-
10
-
-
84887050003
-
SybilInfer: Detecting sybil nodes using social networks
-
DANEZIS, G., and MITTAL, P. SybilInfer: Detecting Sybil Nodes Using Social Networks. In Proc. of NDSS (2009).
-
(2009)
Proc. Of NDSS
-
-
Danezis, G.1
Mittal, P.2
-
11
-
-
84866484075
-
Measuring and fingerprinting click-spam in ad networks
-
DAVE, V., GUHA, S., and ZHANG, Y. Measuring and Fingerprinting Click-Spam in Ad Networks. In Proc. of SIGCOMM (2012).
-
(2012)
Proc. Of SIGCOMM
-
-
Dave, V.1
Guha, S.2
Zhang, Y.3
-
12
-
-
84888989179
-
ViceROI: Catching click-spam in search ad networks
-
DAVE, V., GUHA, S., and ZHANG, Y. ViceROI: Catching Click-Spam in Search Ad Networks. In Proc. of CCS (2013).
-
(2013)
Proc. Of CCS
-
-
Dave, V.1
Guha, S.2
Zhang, Y.3
-
13
-
-
84886653855
-
A compressed PCA Subspace method for anomaly detection in high-dimensional data
-
DING, Q., and KOLACZYK, E. D. A Compressed PCA Subspace Method for Anomaly Detection in High-Dimensional Data. IEEE Transactions on Information Theory 59, 11 (2013).
-
(2013)
IEEE Transactions on Information Theory
, vol.59
, pp. 11
-
-
Ding, Q.1
Kolaczyk, E.D.2
-
14
-
-
84910643028
-
COMPA: Detecting compromised accounts on social networks
-
EGELE, M., STRINGHINI, G., KRUEGEL, C., and VIGNA, G. COMPA: Detecting Compromised Accounts on Social Networks. In Proc. of NDSS (2013).
-
(2013)
Proc. Of NDSS
-
-
Egele, M.1
Stringhini, G.2
Kruegel, C.3
Vigna, G.4
-
16
-
-
85076296472
-
-
Facebook Ads Fake Clicks. http://www.businessinsider.com/mans-600000-facebook-ad-disaster-2014-2.
-
Facebook Ads Fake Clicks
-
-
-
17
-
-
85076296121
-
-
Facebook Advertisement Value (Salon). http://www.salon.com/2014/02/14/facebooks_big_like_problem_major_money_and_major_scams/.
-
-
-
-
24
-
-
85076275806
-
-
Facebook COSN Group. https://www.facebook.com/groups/cosn2013.
-
-
-
-
25
-
-
85076302150
-
-
Facebook Directory. https://www.facebook.com/directory/people/.
-
-
-
-
26
-
-
85076295610
-
-
Facebook Graph Search. https://www.facebook.com/about/graphsearch.
-
-
-
-
30
-
-
85076301108
-
-
Facebook Page insights. https://www.facebook.com/help/336893449723054.
-
-
-
-
31
-
-
85076316253
-
-
Facebook Quarterly Report (2013). http://investor.fb.com/releasedetail.cfm?ReleaseID=821954.
-
(2013)
Facebook Quarterly Report
-
-
-
33
-
-
85076275078
-
-
Facebook SIGCOMM Group. https://www.facebook.com/groups/sigcomm/.
-
-
-
-
34
-
-
85076300240
-
-
Facebook Timeline. https://www.facebook.com/about/timeline.
-
-
-
-
35
-
-
85076315196
-
-
Febipos. A Malware. http://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=Trojan:JS/Febipos.A.
-
Febipos. A Malware
-
-
-
36
-
-
84870880517
-
Detecting and characterizing social spam campaigns
-
GAO, H., HU, J., WILSON, C., LI, Z., CHEN, Y., and ZHAO, B. Y. Detecting and Characterizing Social Spam Campaigns. In Proc. of IMC (2010).
-
(2010)
Proc. Of IMC
-
-
Gao, H.1
Hu, J.2
Wilson, C.3
Li, Z.4
Chen, Y.5
Zhao, B.Y.6
-
37
-
-
80054108010
-
@spam: The underground on 140 characters or less
-
GRIER, C., THOMAS, K., PAXSON, V., and ZHANG, C. M. @spam: The Underground on 140 Characters or Less. In Proc. of CCS (2010).
-
(2010)
Proc. Of CCS
-
-
Grier, C.1
Thomas, K.2
Paxson, V.3
Zhang, C.M.4
-
39
-
-
85038893438
-
Adversarial Machine learning
-
HUANG, L., and JOSEPH., A. D., NELSON, B., RUBINSTEIN, B. I., and TYGAR, J. D. Adversarial Machine Learning. In Proc. of AISec (2011).
-
(2011)
Proc. Of AISec
-
-
Huang, L.1
Joseph, A.D.2
Nelson, B.3
Rubinstein, B.I.4
Tygar, J.D.5
-
40
-
-
77956044597
-
Uncovering social spammers: Social honeypots + Machine learning
-
K. LEE and J. CAVERLEE and AND S. WEBB. Uncovering Social Spammers: Social Honeypots + Machine Learning. In Proc. of SIGIR (2010).
-
(2010)
Proc. Of SIGIR
-
-
Lee, K.1
Caverlee, J.2
Webb, S.3
-
41
-
-
70350647708
-
Collaborative filtering with temporal dynamics
-
KOREN, Y. Collaborative filtering with temporal dynamics. In Proc. of KDD (2009).
-
(2009)
Proc. Of KDD
-
-
Koren, Y.1
-
42
-
-
78650709933
-
On the leakage of personally identifiable information via online social networks
-
KRISHNAMURTHY, B., and WILLS, C. E. On the Leakage of Personally Identifiable Information via Online Social Networks. ACM SIGCOMM Computer Communications Review 40, 1 (2010).
-
(2010)
ACM SIGCOMM Computer Communications Review
, vol.40
, pp. 1
-
-
Krishnamurthy, B.1
Wills, C.E.2
-
43
-
-
85076282850
-
-
L2 Norm. http://mathworld.wolfram.com/L2-Norm.html.
-
L2 Norm
-
-
-
45
-
-
34547487270
-
Detection and identification of network Anomalies using sketch Subspaces
-
LI, X., BIAN, F., CROVELLA, M., DIOT, C., GOVINDAN, R., IANNACCONE, G., and LAKHINA, A. Detection and Identification of Network Anomalies Using Sketch Subspaces. In Proc. of IMC (2006).
-
(2006)
Proc. Of IMC
-
-
Li, X.1
Bian, F.2
Crovella, M.3
Diot, C.4
Govindan, R.5
Iannaccone, G.6
Lakhina, A.7
-
46
-
-
84980400461
-
Simple and deterministic matrix sketching
-
LIBERTY, E. Simple and Deterministic Matrix Sketching. In Proc. of KDD (2013).
-
(2013)
Proc. Of KDD
-
-
Liberty, E.1
-
47
-
-
85076268914
-
-
Zeus Botnet Cleanup (Microsoft). http://blogs.technet.com/b/microsoft_blog/archive/2014/06/02/microsoft-helps-fbi-in-gameover-zeus-botnet-cleanup.aspx.
-
Zeus Botnet Cleanup (Microsoft)
-
-
-
48
-
-
80054703857
-
Ostra: Leverging trust to thwart unwanted communication
-
MISLOVE, A., POST, A., GUMMADI, K. P., and DRUSCHEL, P. Ostra: Leverging Trust to Thwart Unwanted Communication. In Proc. of NSDI (2008).
-
(2008)
Proc. Of NSDI
-
-
Mislove, A.1
Post, A.2
Gummadi, K.P.3
Druschel, P.4
-
49
-
-
78149313346
-
-
Tech. rep., University of Minnesota
-
MOHAISEN, A., YUN, A., and KIM, Y. Measuring the Mixing Time of Social Graphs. Tech. rep., University of Minnesota, 2010.
-
(2010)
Measuring the Mixing Time of Social Graphs
-
-
Mohaisen, A.1
Yun, A.2
Kim, Y.3
-
51
-
-
84856151953
-
Dirty jobs: The role of freelance labor in web service abuse
-
MOTOYAMA, M., MCCOY, D., LEVCHENKO, K., SAVAGE, S., and VOELKER, G. M. Dirty Jobs: The Role of Freelance Labor in Web Service Abuse. In Proc. of USENIX Security (2011).
-
(2011)
Proc. Of USENIX Security
-
-
Motoyama, M.1
Mccoy, D.2
Levchenko, K.3
Savage, S.4
Voelker, G.M.5
-
52
-
-
77953317298
-
Sybil attacks against mobile users: Friends and foes to the rescue
-
QUERCIA, D., and HAILES, S. Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue. In Proc. of INFOCOM (2010).
-
(2010)
Proc. Of INFOCOM
-
-
Quercia, D.1
Hailes, S.2
-
53
-
-
85076213516
-
Efficient and scalable socware detection in online social networks
-
RAHMAN, M. S., HUANG, T.-K., and MADHYASTHA., H. V., and FALOUTSOS, M. Efficient and Scalable Socware Detection in Online Social Networks. In Proc. of USENIX Security (2012).
-
(2012)
Proc. Of USENIX Security
-
-
Rahman, M.S.1
Huang, T.-K.2
Madhyastha, H.V.3
Faloutsos, M.4
-
54
-
-
70349242099
-
Sensitivity of PCA for traffic anomaly detection
-
RINGBERG, H., SOULE, A., REXFORD, J., and DIOT, C. Sensitivity of pca for traffic anomaly detection. In Proc. of SIGMET-RICS (2007).
-
(2007)
Proc. Of SIGMET-RICS
-
-
Ringberg, H.1
Soule, A.2
Rexford, J.3
Diot, C.4
-
55
-
-
78651446533
-
Stealthy poisoning attacks on PCA-based anomaly detectors
-
RUBINSTEIN, B. I. P., NELSON, B., HUANG, L., JOSEPH, A. D., HON LAU, S., RAO, S., TAFT, N., and TYGAR, J. D. Stealthy Poisoning Attacks on PCA-based Anomaly Detectors. ACM SIGMETRICS Performance Evaluation Review 37, 2 (2009).
-
(2009)
ACM SIGMETRICS Performance Evaluation Review
, vol.37
, pp. 2
-
-
Rubinstein, B.I.P.1
Nelson, B.2
Huang, L.3
Joseph, A.D.4
Hon Lau, S.5
Rao, S.6
Taft, N.7
Tygar, J.D.8
-
56
-
-
77956476370
-
-
Tech. rep., EECS Department, University of California, Berkeley
-
RUBINSTEIN, B. I. P., NELSON, B., HUANG, L., JOSEPH, A. D., LAU, S.-H., TAFT, N., and TYGAR, D. Compromising PCA-based Anomaly Detectors for Network-Wide Traffic. Tech. rep., EECS Department, University of California, Berkeley, 2008.
-
(2008)
Compromising PCA-based Anomaly Detectors for Network-Wide Traffic
-
-
Rubinstein, B.I.P.1
Nelson, B.2
Huang, L.3
Joseph, A.D.4
Lau, S.-H.5
Taft, N.6
Tygar, D.7
-
58
-
-
84866599022
-
Poultry markets: On the underground economy of twitter followers
-
STRINGHINI, G., EGELE, M., KRUEGEL, C., and VIGNA, G. Poultry Markets: On the Underground Economy of Twitter Followers. In Proc. of WOSN (2012).
-
(2012)
Proc. Of WOSN
-
-
Stringhini, G.1
Egele, M.2
Kruegel, C.3
Vigna, G.4
-
59
-
-
84890091177
-
Follow the green: Growth and dynamics in twitter follower markets
-
STRINGHINI, G., WANG, G., EGELE, M., KRUEGEL, C., VI-GNA, G., ZHENG, H., and ZHAO, B. Y. Follow the Green: Growth and Dynamics in Twitter Follower Markets. In Proc. of IMC (2013).
-
(2013)
Proc. Of IMC
-
-
Stringhini, G.1
Wang, G.2
Egele, M.3
Kruegel, C.4
Vi-Gna, G.5
Zheng, H.6
Zhao, B.Y.7
-
60
-
-
84889580524
-
UNIK: Unsupervised social network spam detection
-
TAN, E., GUO, L., CHEN, S., ZHANG, X., and ZHAO, Y. E. UNIK: Unsupervised Social Network Spam Detection. In Proc. of CIKM (2013).
-
(2013)
Proc. Of CIKM
-
-
Tan, E.1
Guo, L.2
Chen, S.3
Zhang, X.4
Zhao, Y.E.5
-
61
-
-
79960849345
-
Optimal sybil-resilient node admission control
-
TRAN, N., LI, J., SUBRAMANIAN, L., and CHOW, S. S. Optimal Sybil-resilient Node Admission Control. In Proc. of INFO-COM (2011).
-
(2011)
Proc. Of INFO-COM
-
-
Tran, N.1
Li, J.2
Subramanian, L.3
Chow, S.S.4
-
62
-
-
78149337076
-
An analysis of social network-based sybil defenses
-
VISWANATH, B., POST, A., GUMMADI, K. P., and MISLOVE, A. An Analysis of Social Network-based Sybil Defenses. In Proc. of SIGCOMM (2010).
-
(2010)
Proc. Of SIGCOMM
-
-
Viswanath, B.1
Post, A.2
Gummadi, K.P.3
Mislove, A.4
-
63
-
-
85076287406
-
You are how you click: Clickstream analysis for sybil detection
-
WANG, G., KONOLIGE, T., WILSON, C., WANG, X., ZHENG, H., and ZHAO, B. Y. You are How You Click: Clickstream Analysis for Sybil Detection. In Proc. of USENIX Security (2013).
-
(2013)
Proc. Of USENIX Security
-
-
Wang, G.1
Konolige, T.2
Wilson, C.3
Wang, X.4
Zheng, H.5
Zhao, B.Y.6
-
64
-
-
58449122201
-
Spamming botnets: Signatures and characteristics
-
XIE, Y., YU, F., ACHAN, K., PANIGRAHY, R., HULTEN, G., AND OSIPKOV, I. Spamming Botnets: Signatures and Characteristics. In Proc. of SIGCOMM (2008).
-
(2008)
Proc. Of SIGCOMM
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
-
65
-
-
82955161549
-
Uncovering social network sybils in the wild
-
YANG, Z., WILSON, C., WANG, X., GAO, T., and ZHAO., B. Y., and DAI, Y. Uncovering Social Network Sybils In the Wild. In Proc. of IMC (2011).
-
(2011)
Proc. Of IMC
-
-
Yang, Z.1
Wilson, C.2
Wang, X.3
Gao, T.4
Zhao, B.Y.5
Dai, Y.6
-
66
-
-
45749116664
-
Sybil-limit: A near-optimal social network defense against sybil attacks
-
YU, H., and GIBBONS., P. B., KAMINSKY, M., and XIAO, F. Sybil-Limit: A Near-optimal Social Network Defense Against Sybil Attacks. In Proc. of IEEE S & P (2008).
-
(2008)
Proc. Of IEEE S & P
-
-
Yu, H.1
Gibbons, P.B.2
Kaminsky, M.3
Xiao, F.4
-
67
-
-
35548992569
-
SybilGuard: Defending against sybil attacks via social networks
-
YU, H., KAMINSKY, M., GIBBONS, P. B., and FLAXMAN, A. SybilGuard: Defending Against Sybil Attacks via Social Networks. In Proc. of SIGCOMM (2006).
-
(2006)
Proc. Of SIGCOMM
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
|