暂无分享,去创建一个
[1] Norbert Pohlmann,et al. Exploiting visual appearance to cluster and detect rogue software , 2013, SAC '13.
[2] Zhou Li,et al. Understanding the Dark Side of Domain Parking , 2014, USENIX Security Symposium.
[3] Xin Zhao,et al. The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution , 2010, LEET.
[4] David Hylender,et al. Data Breach Investigations Report , 2011 .
[5] Leyla Bilge,et al. Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks , 2015, DIMVA.
[6] Chris Kanich,et al. Every Second Counts: Quantifying the Negative Externalities of Cybercrime via Typosquatting , 2015, 2015 IEEE Symposium on Security and Privacy.
[7] Damon McCoy,et al. There Are No Free iPads: An Analysis of Survey Scams as a Business , 2013, LEET.
[8] David Harley,et al. MY PC HAS 32,539 ERRORS: HOW TELEPHONE SUPPORT SCAMS REALLY WORK , 2012 .
[9] A. Narayanan,et al. OpenWPM : An automated platform for web privacy measurement , 2016 .
[10] Tyler Moore,et al. Measuring the Perpetrators and Funders of Typosquatting , 2010, Financial Cryptography.
[11] Lorenzo Martignoni,et al. A Fistful of Red-Pills: How to Automatically Generate Procedures to Detect CPU Emulators , 2009, WOOT.
[12] Christopher Krügel,et al. The Underground Economy of Fake Antivirus Software , 2011, WEIS.
[13] Nicolas Christin,et al. Dissecting one click frauds , 2010, CCS '10.
[14] Wouter Joosen,et al. Parking Sensors: Analyzing and Detecting Parked Domains , 2015, NDSS.
[15] Chris Kanich,et al. The Long "Taile" of Typosquatting Domain Names , 2014, USENIX Security Symposium.
[16] Aurélien Francillon,et al. The role of phone numbers in understanding cyber-crime schemes , 2013, 2013 Eleventh Annual Conference on Privacy, Security and Trust.
[17] Adam Doupé,et al. SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[18] Gianluca Stringhini,et al. Stranger danger: exploring the ecosystem of ad-based URL shortening services , 2014, WWW.
[19] Angelos D. Keromytis,et al. An Analysis of Rogue AV Campaigns , 2010, RAID.
[20] Yi-Min Wang,et al. Strider Typo-Patrol: Discovery and Analysis of Systematic Typo-Squatting , 2006, SRUTI.
[21] Wouter Joosen,et al. Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse , 2015, NDSS.
[22] Paolo Milani Comparetti,et al. EvilSeed: A Guided Approach to Finding Malicious Web Pages , 2012, 2012 IEEE Symposium on Security and Privacy.
[23] Mustaque Ahamad,et al. Phoneypot: Data-driven Understanding of Telephony Threats , 2015, NDSS.
[24] Federico Maggi. Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.