-
1
-
-
85075111016
-
-
DomainTools. http://www.domaintools.com.
-
-
-
-
2
-
-
85075107956
-
-
URIBL. http://www.uribl.com.
-
-
-
-
3
-
-
85075110809
-
-
Jan
-
Price Increase For .cn Chinese Website Domain Names. http://www.techsecuritychina.com/2010/01/07/9093-price-increase-for-cn-chinesewebsite-domain-names/, Jan. 2010.
-
(2010)
Cn Chinese Website Domain Names
-
-
-
4
-
-
85075103752
-
-
Feb
-
Registrar report for eNom. http://www.webhosting.info/registrars/reports/total_domains/enom.com?ob=gs&oo=asc, Feb. 2011.
-
(2011)
Registrar Report for eNom
-
-
-
5
-
-
85075105691
-
Demand media–ENOM: The world’s #1 bad host and abusive registrar
-
Aug
-
J. Armin. Demand Media–eNom: the World’s #1 Bad Host and Abusive Registrar. Technical report, HostExploit, Aug. 2010.
-
(2010)
Technical Report, HostExploit
-
-
Armin, J.1
-
11
-
-
85075113172
-
-
Форум успешных вебмастеров. Oct
-
Elmaros. Форум успешных вебмастеров. http://www.gofuckbiz.com/showpost.php?p=382053, Oct. 2010.
-
(2010)
-
-
-
12
-
-
85084096166
-
On the potential of proactive domain blacklisting
-
San Jose, CA, USA, Apr
-
M. Felegyhazi, C. Kreibich, and V. Paxson. On the potential of proactive domain blacklisting. In Proceedings of the Third USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), San Jose, CA, USA, Apr. 2010.
-
(2010)
Proceedings of the Third USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)
-
-
Felegyhazi, M.1
Kreibich, C.2
Paxson, V.3
-
16
-
-
85075101695
-
NSI registry registrar protocol
-
The Internet Society, May
-
S. Hollenbeck and M. Srivastava. NSI registry registrar protocol. RFC 2832, The Internet Society, May 2000.
-
(2000)
RFC 2832
-
-
Hollenbeck, S.1
Srivastava, M.2
-
19
-
-
85084095449
-
Spamcraft: An inside look at spam campaign orchestration
-
Boston, USA, Apr
-
C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. M. Voelker, V. Paxson, and S. Savage. Spamcraft: An inside look at spam campaign orchestration. In Proceedings of the Second USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), Boston, USA, Apr. 2009.
-
(2009)
Proceedings of the Second USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)
-
-
Kreibich, C.1
Kanich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.M.5
Paxson, V.6
Savage, S.7
-
21
-
-
80051960199
-
Click trajectories: End-to-end analysis of the spam value chain
-
May
-
K. Levchenko, A. Pitsillidis, N. Chachra, B. Enright, M. Félegyházi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, D. McCoy, N. Weaver, V. Paxson, G. M. Voelker, and S. Savage. Click Trajectories: End-to-End Analysis of the Spam Value Chain. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland), May 2011.
-
(2011)
Proceedings of the IEEE Symposium on Security and Privacy (Oakland)
-
-
Levchenko, K.1
Pitsillidis, A.2
Chachra, N.3
Enright, B.4
Félegyházi, M.5
Grier, C.6
Halvorson, T.7
Kanich, C.8
Kreibich, C.9
Liu, H.10
McCoy, D.11
Weaver, N.12
Paxson, V.13
Voelker, G.M.14
Savage, S.15
-
22
-
-
37849049401
-
On the effectiveness of techniques to detect phishing sites
-
C. Ludl, S. McAllister, E. Kirda, and C. Kruegel. On the effectiveness of techniques to detect phishing sites. Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), pages 20–39, 2007.
-
(2007)
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA)
, pp. 20-39
-
-
Ludl, C.1
McAllister, S.2
Kirda, E.3
Kruegel, C.4
-
23
-
-
70350630557
-
Beyond blacklists: Learning to detect malicious web sites from suspicious URLs
-
ACM
-
J. Ma, L. Saul, S. Savage, and G. Voelker. Beyond blacklists: learning to detect malicious web sites from suspicious URLs. In Proceedings of the 15th ACM SIGKDD Intl. Conference on Knowledge Discovery and Data Mining, pages 1245–1254. ACM, 2009.
-
(2009)
Proceedings of the 15th ACM SIGKDD Intl. Conference on Knowledge Discovery and Data Mining
, pp. 1245-1254
-
-
Ma, J.1
Saul, L.2
Savage, S.3
Voelker, G.4
-
24
-
-
77953898602
-
Examining the impact of website take-down on phishing
-
T. Moore and R. Clayton. Examining the impact of website take-down on phishing. In eCrime Researchers Summit, pages 1–13, 2007.
-
(2007)
eCrime Researchers Summit
, pp. 1-13
-
-
Moore, T.1
Clayton, R.2
-
25
-
-
67249096586
-
The consequence of non-cooperation in the fight against phishing
-
T. Moore and R. Clayton. The consequence of non-cooperation in the fight against phishing. In eCrime Researchers Summit, pages 1–14, 2008.
-
(2008)
eCrime Researchers Summit
, pp. 1-14
-
-
Moore, T.1
Clayton, R.2
-
27
-
-
77953329477
-
PhishNet: Predictive blacklisting to detect phishing attacks
-
IEEE
-
P. Prakash, M. Kumar, R. Kompella, and M. Gupta. Phishnet: predictive blacklisting to detect phishing attacks. In Proc. INFOCOM, pages 1–5. IEEE, 2010.
-
(2010)
Proc. INFOCOM
, pp. 1-5
-
-
Prakash, P.1
Kumar, M.2
Kompella, R.3
Gupta, M.4
-
28
-
-
84904793179
-
An empirical analysis of phishing blacklists
-
S. Sheng, B. Wardman, G. Warner, L. Cranor, J. Hong, and C. Zhang. An empirical analysis of phishing blacklists. In Sixth Conference on Email and Anti-Spam (CEAS), 2009.
-
(2009)
Sixth Conference on Email and Anti-Spam (CEAS)
-
-
Sheng, S.1
Wardman, B.2
Warner, G.3
Cranor, L.4
Hong, J.5
Zhang, C.6
|