-
3
-
-
84874905168
-
-
Google
-
Google. Google Safe Browsing API. http://code.google.com/apis/safebrowsing/.
-
Google Safe Browsing API
-
-
-
4
-
-
85180408002
-
Browser Exploits as a Service: The Monetization of Driveby Downloads
-
October
-
C. Grier, L. Ballard, J. Caballero, N. Chachra, C. J. Dietrich, K. Levchenko, P. Mavrommatis, D. McCoy, A. Nappa, A. Pitsillidis, N. Provos, Z. Rafique, M. A. Rajab, C. Rossow, K. Thomas, V. Paxson, S. Savage, and G. M. Voelker. Browser Exploits as a Service: The Monetization of Driveby Downloads. In Proceedings of The 19th ACM Conference on Computer and Communications Security, October 2012.
-
(2012)
Proceedings of The 19th ACM Conference on Computer and Communications Security
-
-
Grier, C.1
Ballard, L.2
Caballero, J.3
Chachra, N.4
Dietrich, C. J.5
Levchenko, K.6
Mavrommatis, P.7
McCoy, D.8
Nappa, A.9
Pitsillidis, A.10
Provos, N.11
Rafique, Z.12
Rajab, M. A.13
Rossow, C.14
Thomas, K.15
Paxson, V.16
Savage, S.17
Voelker, G. M.18
-
5
-
-
85076487784
-
deSEO: Combating Search-Result Poisoning
-
August
-
J. P. John, F. Yu, Y. Xie, A. Krishnamurthy, and M. Abadi. deSEO: Combating Search-Result Poisoning. In Proceedings of the 20th USENIX Security Symposium, August 2011.
-
(2011)
Proceedings of the 20th USENIX Security Symposium
-
-
John, J. P.1
Yu, F.2
Xie, Y.3
Krishnamurthy, A.4
Abadi, M.5
-
6
-
-
70349272437
-
Spamalytics: an Empirical Analysis of Spam Marketing Conversion
-
Oct
-
C. Kanich, C. Kreibich, K. Levchenko, B. Enright, V. Paxson, G. M. Voelker, and S. Savage. Spamalytics: an Empirical Analysis of Spam Marketing Conversion. In Proceedings of the ACM Conference on Computer and Communications Security, Oct. 2008.
-
(2008)
Proceedings of the ACM Conference on Computer and Communications Security
-
-
Kanich, C.1
Kreibich, C.2
Levchenko, K.3
Enright, B.4
Paxson, V.5
Voelker, G. M.6
Savage, S.7
-
11
-
-
80051960199
-
Click Trajectories: End-to-End Analysis of the Spam Value Chain
-
Oakland, CA, May
-
K. Levchenko, N. Chachra, B. Enright, M. Félegyházi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, D. McCoy, A. Pitsillidis, N. Weaver, V. Paxson, G. M. Voelker, and S. Savage. Click Trajectories: End-to-End Analysis of the Spam Value Chain. In Proceedings of the IEEE Symposium and Security and Privacy, Oakland, CA, May 2011.
-
(2011)
Proceedings of the IEEE Symposium and Security and Privacy
-
-
Levchenko, K.1
Chachra, N.2
Enright, B.3
Félegyházi, M.4
Grier, C.5
Halvorson, T.6
Kanich, C.7
Kreibich, C.8
Liu, H.9
McCoy, D.10
Pitsillidis, A.11
Weaver, N.12
Paxson, V.13
Voelker, G. M.14
Savage, S.15
-
14
-
-
84900789776
-
PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs
-
D. McCoy, A. Pitsillidis, G. Jordan, N. Weaver, C. Kreibich, B. Krebs, G. M. Voelker, S. Savage, and K. Levchenko. PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs. In Proceedings of the 21th USENIX Security Symposium, 2012.
-
(2012)
Proceedings of the 21th USENIX Security Symposium
-
-
McCoy, D.1
Pitsillidis, A.2
Jordan, G.3
Weaver, N.4
Kreibich, C.5
Krebs, B.6
Voelker, G. M.7
Savage, S.8
Levchenko, K.9
-
17
-
-
84869407868
-
The Underground Economy of Fake Antivirus Software
-
B. Stone-Gross, R. Abman, R. Kemmerer, C. Kruegel, D. Steigerwald, and G. Vigna. The Underground Economy of Fake Antivirus Software. In Proc. of the 10th Workshop on the Economics of Information Security (WEIS), 2011.
-
(2011)
Proc. of the 10th Workshop on the Economics of Information Security (WEIS)
-
-
Stone-Gross, B.1
Abman, R.2
Kemmerer, R.3
Kruegel, C.4
Steigerwald, D.5
Vigna, G.6
-
20
-
-
35348904515
-
Spam Double-Funnel: Connecting Web Spammers with Advertisers
-
May
-
Y.-M. Wang, M. Ma, Y. Niu, and H. Chen. Spam Double-Funnel: Connecting Web Spammers with Advertisers. In Proceedings of the 16th International World Wide Web Conference (WWW'07), pages 291-300, May 2007.
-
(2007)
Proceedings of the 16th International World Wide Web Conference (WWW'07)
, pp. 291-300
-
-
Wang, Y.-M.1
Ma, M.2
Niu, Y.3
Chen, H.4
|