Follow the traffic: Stopping click fraud by disrupting the value chain
暂无分享,去创建一个
David Décary-Hétu | José M. Fernandez | José M. Fernandez | Antoine Lemay | Joan Calvet | Benoit Dupont | Francois Labreche | Matthieu Faou | Militza Jean | A. Lemay | Joan Calvet | Benoît Dupont | D. Décary-Hêtu | Francois Labreche | Matthieu Faou | Militza Jean | François Labrèche | D. Décary‐Hétu
[1] Vern Paxson,et al. Measurement and Analysis of Traffic Exchange Services , 2015, Internet Measurement Conference.
[2] Vern Paxson,et al. Ad Injection at Scale: Assessing Deceptive Advertisement Modifications , 2015, 2015 IEEE Symposium on Security and Privacy.
[3] Tyler Moore,et al. Concentrating Correctly on Cybercrime Concentration , 2015, WEIS.
[4] Chris Kanich,et al. No Please, After You: Detecting Fraud in Affiliate Marketing Networks , 2015, WEIS.
[5] Saikat Guha,et al. Characterizing Large-Scale Click Fraud in ZeroAccess , 2014, CCS.
[6] Jaromír Horejší,et al. NOTES ON CLICK FRAUD: AMERICAN STORY , 2014 .
[7] Yin Zhang,et al. ViceROI: catching click-spam in search ad networks , 2013, CCS.
[8] Alexandre Gerber,et al. Dissecting ghost clicks: ad fraud via misdirected human clicks , 2012, ACSAC '12.
[9] Sean F. Everton. Disrupting Dark Networks , 2012 .
[10] GuhaSaikat,et al. Measuring and fingerprinting click-spam in ad networks , 2012 .
[11] David Décary-Hétu,et al. The social network of hackers , 2012 .
[12] Yin Zhang,et al. Measuring and fingerprinting click-spam in ad networks , 2012, SIGCOMM '12.
[13] Walter Willinger,et al. Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference , 2011, IMC 2011.
[14] Christopher Krügel,et al. Understanding fraudulent activities in online ad exchanges , 2011, IMC '11.
[15] Vern Paxson,et al. What's Clicking What? Techniques and Innovations of Today's Clickbots , 2011, DIMVA.
[16] S. Savage,et al. Got traffic?: an evaluation of click traffic providers , 2011, WebQuality '11.
[17] John McHugh,et al. Sybil attacks as a mitigation strategy against the Storm botnet , 2008, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE).
[18] John McHugh,et al. Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures? , 2008, ESORICS.
[19] Hector Garcia-Molina,et al. Should Ad Networks Bother Fighting Click Fraud? (Yes, They Should.) , 2008 .
[20] Neil Daswani,et al. The Anatomy of Clickbot.A , 2007, HotBots.
[21] Stephen P. Borgatti,et al. Identifying sets of key players in a social network , 2006, Comput. Math. Organ. Theory.