Fashion crimes: trending-term exploitation on the web
暂无分享,去创建一个
[1] Martín Abadi,et al. deSEO: Combating Search-Result Poisoning , 2011, USENIX Security Symposium.
[2] Chris Kanich,et al. Spamalytics: an empirical analysis of spam marketing conversion , 2009, CACM.
[3] Tyler Moore,et al. Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing , 2009, Financial Cryptography.
[4] Niels Provos,et al. All Your iFRAMEs Point to Us , 2008, USENIX Security Symposium.
[5] Halifu Osumare. “It’s All About the Benjamins” , 2007 .
[6] He Liu,et al. Click Trajectories: End-to-End Analysis of the Spam Value Chain , 2011, 2011 IEEE Symposium on Security and Privacy.
[7] Thorsten Joachims,et al. Accurately interpreting clickthrough data as implicit feedback , 2005, SIGIR '05.
[8] Jure Leskovec,et al. Meme-tracking and the dynamics of the news cycle , 2009, KDD.
[9] Xin Zhao,et al. The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution , 2010, LEET.
[10] Nicolas Christin,et al. It's All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice , 2011, Financial Cryptography.
[11] Ron Kohavi,et al. A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection , 1995, IJCAI.
[12] Gregory F. Cooper,et al. A Bayesian method for the induction of probabilistic networks from data , 1992, Machine Learning.
[13] Vern Paxson,et al. @spam: the underground on 140 characters or less , 2010, CCS '10.
[14] Tyler Moore,et al. Measuring the Perpetrators and Funders of Typosquatting , 2010, Financial Cryptography.
[15] Stefan Savage,et al. An inquiry into the nature and causes of the wealth of internet miscreants , 2007, CCS '07.
[16] Christopher Krügel,et al. The Underground Economy of Fake Antivirus Software , 2011, WEIS.
[17] Nicolas Christin,et al. Dissecting one click frauds , 2010, CCS '10.
[18] Angelos D. Keromytis,et al. An Analysis of Rogue AV Campaigns , 2010, RAID.
[19] Hector Garcia-Molina,et al. Link Spam Alliances , 2005, VLDB.
[20] Tyler Moore,et al. Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade , 2011, USENIX Security Symposium.
[21] Tyler Moore,et al. Examining the impact of website take-down on phishing , 2007, eCrime '07.
[22] Tyler Moore,et al. Temporal Correlations between Spam and Phishing Websites , 2009, LEET.
[23] Niels Provos,et al. The Ghost in the Browser: Analysis of Web-based Malware , 2007, HotBots.