Connected Colors: Unveiling the Structure of Criminal Networks
暂无分享,去创建一个
Wenke Lee | Roberto Perdisci | Yacin Nadji | Manos Antonakakis | Wenke Lee | R. Perdisci | M. Antonakakis | Yacin Nadji
[1] Mathieu Bastian,et al. Gephi: An Open Source Software for Exploring and Manipulating Networks , 2009, ICWSM.
[2] Tyler Moore,et al. Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade , 2011, USENIX Security Symposium.
[3] Nick Feamster,et al. Dynamics of Online Scam Hosting Infrastructure , 2009, PAM.
[4] Jean-Loup Guillaume,et al. Fast unfolding of communities in large networks , 2008, 0803.0476.
[5] Prateek Mittal,et al. BotGrep: Finding P2P Bots with Structured Graph Analysis , 2010, USENIX Security Symposium.
[6] Stefan Savage,et al. PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs , 2012, USENIX Security Symposium.
[7] Sergey Brin,et al. The Anatomy of a Large-Scale Hypertextual Web Search Engine , 1998, Comput. Networks.
[8] Felix C. Freiling,et al. Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones , 2009, ESORICS.
[9] Kathryn Fraughnaugh,et al. Introduction to graph theory , 1973, Mathematical Gazette.
[10] Shishir Nagaraja,et al. The Topology of Covert Conflict , 2005, WEIS.
[11] Andreas Terzis,et al. A multifaceted approach to understanding the botnet phenomenon , 2006, IMC '06.
[12] Vinod Yegneswaran,et al. BLADE: an attack-agnostic approach for preventing drive-by malware infections , 2010, CCS '10.
[13] Nicolas Christin,et al. Dissecting one click frauds , 2010, CCS '10.
[14] Timothy J. Shimeall,et al. Predicting future botnet addresses with uncleanliness , 2007 .
[15] Stefano Zanero,et al. BURN: baring unknown rogue networks , 2011, VizSec '11.
[16] Kevin C. Almeroth,et al. FIRE: FInding Rogue nEtworks , 2009, 2009 Annual Computer Security Applications Conference.
[17] Florian Weimer,et al. Passive DNS Replication , 2005 .
[18] Nick Feamster,et al. Fast Flux Service Networks: Dynamics and Roles in Hosting Online Scams , 2008 .
[19] Angelos D. Keromytis,et al. An Analysis of Rogue AV Campaigns , 2010, RAID.
[20] Mark Newman,et al. Networks: An Introduction , 2010 .
[21] Peng Ning,et al. Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings , 2009, ESORICS.
[22] Vern Paxson,et al. Measuring Pay-per-Install: The Commoditization of Malware Distribution , 2011, USENIX Security Symposium.
[23] Dawn Xiaodong Song,et al. Insights from the Inside: A View of Botnet Management from Infiltration , 2010, LEET.