-
3
-
-
84949626334
-
SpamScatter: Characterizing internet scam hosting infrastructure
-
Boston, MA, Aug
-
D. S. Anderson, C. Fleizach, S. Savage, and G. M. Voelker. Spamscatter: Characterizing Internet Scam Hosting Infrastructure. In Proceedings of the USENIX Security Symposium, Boston, MA, Aug. 2007.
-
(2007)
Proceedings of the USENIX Security Symposium
-
-
Anderson, D.S.1
Fleizach, C.2
Savage, S.3
Voelker, G.M.4
-
4
-
-
77952415099
-
An inquiry into the nature and causes of the wealth of internet miscreants
-
Washington, D.C., Nov
-
J. Franklin, V. Paxson, A. Perrig, and S. Savage. An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants. In ACM CCS, Washington, D.C., Nov. 2007.
-
(2007)
ACM CCS
-
-
Franklin, J.1
Paxson, V.2
Perrig, A.3
Savage, S.4
-
7
-
-
70349272437
-
Spamalytics: An empirical analysis of spam marketing conversion
-
Alexandria, Virginia, USA, October
-
C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. M. Voelker, V. Paxson, and S. Savage. Spamalytics: An empirical analysis of spam marketing conversion. In ACM CCS, pages 3–14, Alexandria, Virginia, USA, October 2008.
-
(2008)
ACM CCS
, pp. 3-14
-
-
Kanich, C.1
Kreibich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.M.5
Paxson, V.6
Savage, S.7
-
8
-
-
85084096724
-
The heisenbot uncertainty problem: Challenges in separating bots from chaff
-
April
-
C. Kanich, K. Levchenko, B. Enright, G. M. Voelker, and S. Savage. The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff. In First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), April 2008.
-
(2008)
First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)
-
-
Kanich, C.1
Levchenko, K.2
Enright, B.3
Voelker, G.M.4
Savage, S.5
-
9
-
-
85084096033
-
On the spam campaign trail
-
San Francisco, CA, April
-
C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. M. Voelker, V. Paxson, and S. Savage. On the Spam Campaign Trail. In Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), San Francisco, CA, April 2008.
-
(2008)
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)
-
-
Kreibich, C.1
Kanich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.M.5
Paxson, V.6
Savage, S.7
-
11
-
-
44649128920
-
-
Technical report, Computer Science Laboratory, SRI International, October
-
P. Porras, H. Saïdi, and V. Yegneswaran. A Multi-perspective Analysis of the Storm (Peacomm) Worm. Technical report, Computer Science Laboratory, SRI International, October 2007.
-
(2007)
A Multi-Perspective Analysis of the Storm (Peacomm) Worm
-
-
Porras, P.1
Saïdi, H.2
Yegneswaran, V.3
-
12
-
-
70350233086
-
Understanding how spammers steal your e-mail address: An analysis of the first six months of data from project honey pot
-
M. Prince, B. Dahl, L. Holloway, A. Keller, and E. Langheinrich. Understanding How Spammers Steal Your E-Mail Address: An Analysis of the First Six Months of Data from Project Honey Pot. In Second Conference on Email and Anti-Spam (CEAS), 2005.
-
(2005)
Second Conference on Email and Anti-Spam (CEAS)
-
-
Prince, M.1
Dahl, B.2
Holloway, L.3
Keller, A.4
Langheinrich, E.5
-
13
-
-
84904808498
-
Observed trends in spam construction techniques: A case study of spam evolution
-
C. Pu and S. Webb. Observed Trends in Spam Construction Techniques: A Case Study of Spam Evolution. In Third Conference on Email and Anti-Spam (CEAS), 2006.
-
(2006)
Third Conference on Email and Anti-Spam (CEAS)
-
-
Pu, C.1
Webb, S.2
-
14
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenomenon
-
Rio de Janeiro, Brazil, Oct
-
M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis. A Multifaceted Approach to Understanding the Botnet Phenomenon. In Proceedings of the ACM Internet Measurement Conference, Rio de Janeiro, Brazil, Oct. 2006.
-
(2006)
Proceedings of the ACM Internet Measurement Conference
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
17
-
-
85084095135
-
Characterizing botnets from email spam records
-
April
-
L. Zhuang, J. Dunagan, D. R. Simon, H. J. Wang, I. Osipkov, G. Hulten, and J. Tygar. Characterizing Botnets from Email Spam Records. In First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), April 2008.
-
(2008)
First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)
-
-
Zhuang, L.1
Dunagan, J.2
Simon, D.R.3
Wang, H.J.4
Osipkov, I.5
Hulten, G.6
Tygar, J.7
|