暂无分享,去创建一个
Manos Antonakakis | Nick Nikiforakis | Mustaque Ahamad | Monjur Alam | Bharat Srinivasan | Athanasios Kountouras | Najmeh Miramirkhani | M. Ahamad | Nick Nikiforakis | M. Antonakakis | Monjur Alam | Bharat Srinivasan | N. Miramirkhani | Athanasios Kountouras
[1] Tyler Moore,et al. Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade , 2011, USENIX Security Symposium.
[2] Wei Wang,et al. Discovery of emergent malicious campaigns in cellular networks , 2013, ACSAC.
[3] Nicolas Christin,et al. Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem , 2015, USENIX Security Symposium.
[4] Leyla Bilge,et al. EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis , 2011, NDSS.
[5] Shachi Sharma,et al. HiCHO: Attributes Based Classification of Ubiquitous Devices , 2011, MobiQuitous.
[6] Evangelos P. Markatos,et al. A Systematic Characterization of IM Threats using Honeypots , 2010, NDSS.
[7] Stefan Savage,et al. Spamscatter: Characterizing Internet Scam Hosting Infrastructure , 2007, USENIX Security Symposium.
[8] Andrew W. Moore,et al. X-means: Extending K-means with Efficient Estimation of the Number of Clusters , 2000, ICML.
[9] Aurélien Francillon,et al. Using chatbots against voice spam: Analyzing Lenny's effectiveness , 2017, SOUPS.
[10] Jr. G. Forney,et al. The viterbi algorithm , 1973 .
[11] Aurélien Francillon,et al. Inside the SCAM Jungle: A Closer Look at 419 Scam Email Operations , 2013, IEEE Symposium on Security and Privacy Workshops.
[12] Vern Paxson,et al. @spam: the underground on 140 characters or less , 2010, CCS '10.
[13] Dawn Xiaodong Song,et al. Design and Evaluation of a Real-Time URL Spam Filtering Service , 2011, 2011 IEEE Symposium on Security and Privacy.
[14] Yin Zhang,et al. ViceROI: catching click-spam in search ad networks , 2013, CCS.
[15] Markus Jakobsson,et al. Scambaiter: Understanding Targeted Nigerian Scams on Craigslist , 2014, NDSS.
[16] Mustaque Ahamad,et al. Phoneypot: Data-driven Understanding of Telephony Threats , 2015, NDSS.
[17] Damon McCoy,et al. Dialing Back Abuse on Phone Verified Accounts , 2014, CCS.
[18] Roger Piqueras Jover,et al. Crime scene investigation: SMS spam data analysis , 2012, IMC '12.
[19] Nick Feamster,et al. Building a Dynamic Reputation System for DNS , 2010, USENIX Security Symposium.
[20] Michael McGill,et al. Introduction to Modern Information Retrieval , 1983 .
[21] Manos Antonakakis,et al. Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution , 2016, ESORICS.
[22] Nan Jiang,et al. Greystar : Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks using Grey Phone Space , 2013 .
[23] Chris Kanich,et al. Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context , 2010, USENIX Security Symposium.
[24] Nick Nikiforakis,et al. Dial One for Scam: A Large-Scale Analysis of Technical Support Scams , 2016, NDSS.