Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem
暂无分享,去创建一个
[1] William J. Sutherland,et al. Ecological census techniques: A handbook: Edited by William J. Sutherland Cambridge University Press, 1996. £75.00/$125.00 hbk, £27.95/$44.95 pbk (xv + 336 pages) ISBN 0 521 66135 5 / 367921 1 , 1997 .
[2] Eric Wustrow,et al. Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices , 2012, USENIX Security Symposium.
[3] Chris Kanich,et al. The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff , 2008, LEET.
[4] M. Barratt,et al. Use of Silk Road, the online drug marketplace, in the United Kingdom, Australia and the United States. , 2014, Addiction.
[5] Stefan Savage,et al. Juice: A Longitudinal Study of an SEO Botnet , 2013, NDSS.
[6] Stefan Savage,et al. A fistful of bitcoins: characterizing payments among men with no names , 2013, Internet Measurement Conference.
[7] Christian Louboutin,et al. UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK , 2005 .
[8] Martín Abadi,et al. deSEO: Combating Search-Result Poisoning , 2011, USENIX Security Symposium.
[9] J. Aldridge,et al. Not an 'Ebay for Drugs': The Cryptomarket 'Silk Road' as a Paradigm Shifting Criminal Innovation , 2014 .
[10] Tyler Moore,et al. Fashion crimes: trending-term exploitation on the web , 2011, CCS '11.
[11] Nicolas Christin,et al. Dissecting one click frauds , 2010, CCS '10.
[12] Christopher Krügel,et al. Framing Dependencies Introduced by Underground Commoditization , 2015, WEIS.
[13] Nicolas Christin,et al. Traveling the silk road: a measurement analysis of a large anonymous online marketplace , 2012, WWW.
[14] William J. Sutherland,et al. Ecological Census Techniques: Contents , 1996 .
[15] Eastern District,et al. UNITED STATES DISTRICT COURT , 1999 .
[16] R. C. Turner,et al. IN THE UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF NEW YORK , 1990 .
[17] S A R A H M E I K L E J O H N,et al. A Fistful of Bitcoins Characterizing Payments Among Men with No Names , 2013 .
[18] Lawrence K. Saul,et al. Search + Seizure: The Effectiveness of Interventions on SEO Campaigns , 2014, Internet Measurement Conference.
[19] Wenke Lee,et al. SURF: detecting and measuring search poisoning , 2011, CCS '11.
[20] Stefan Savage,et al. PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs , 2012, USENIX Security Symposium.
[21] Zhou Li,et al. Hunting the Red Fox Online: Understanding and Detection of Mass Redirect-Script Injections , 2014, 2014 IEEE Symposium on Security and Privacy.
[22] He Liu,et al. Click Trajectories: End-to-End Analysis of the Spam Value Chain , 2011, 2011 IEEE Symposium on Security and Privacy.
[23] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[24] M. Van Hout,et al. 'Silk Road', the virtual drug marketplace: a single case study of user experiences. , 2013, The International journal on drug policy.
[25] Tyler Moore,et al. Measuring the Cost of Cybercrime , 2012, WEIS.
[26] Sarah Meiklejohn,et al. Privacy-Enhancing Overlays in Bitcoin , 2015, Financial Cryptography Workshops.
[27] Arjen K. Lenstra,et al. Ron was wrong, Whit is right , 2012, IACR Cryptol. ePrint Arch..
[28] Diana S. Dolliver. Evaluating drug trafficking on the Tor Network: Silk Road 2, the sequel. , 2015, The International journal on drug policy.
[29] E. Kaplan,et al. Nonparametric Estimation from Incomplete Observations , 1958 .