Panning for gold.com: Understanding the Dynamics of Domain Dropcatching
暂无分享,去创建一个
[1] Stefan Savage,et al. Affiliate Crookies: Characterizing Affiliate Marketing Abuse , 2015, Internet Measurement Conference.
[2] Tobias Lauinger,et al. WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-Registration , 2016, Internet Measurement Conference.
[3] Chris Kanich,et al. Every Second Counts: Quantifying the Negative Externalities of Cybercrime via Typosquatting , 2015, 2015 IEEE Symposium on Security and Privacy.
[4] Wouter Joosen,et al. Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse , 2015, NDSS.
[5] Georg Carle,et al. A forensic case study on as hijacking: the attacker's perspective , 2013, CCRV.
[6] Tobias Lauinger,et al. Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers , 2017, USENIX Security Symposium.
[7] David Kesmodel,et al. The Domain Game: How People Get Rich from Internet Domain Names , 2008 .
[8] Steven D. Gribble,et al. Cutting through the Confusion: A Measurement Study of Homograph Attacks , 2006, USENIX Annual Technical Conference, General Track.
[9] Tyler Moore,et al. Measuring the Perpetrators and Funders of Typosquatting , 2010, Financial Cryptography.
[10] Wouter Joosen,et al. You are what you include: large-scale evaluation of remote javascript inclusions , 2012, CCS.
[11] Georg Carle,et al. The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire , 2015, TMA.
[12] Patrick D. McDaniel,et al. Domain-Z: 28 Registrations Later Measuring the Exploitation of Residual Trust in Domains , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[13] Vern Paxson,et al. The BIZ Top-Level Domain: Ten Years Later , 2012, PAM.
[14] Lawrence K. Saul,et al. From .academy to .zone: An Analysis of the New TLD Land Rush , 2015, Internet Measurement Conference.
[15] Vern Paxson,et al. On the Potential of Proactive Domain Blacklisting , 2010, LEET.
[16] Nikolaos Pitropakis,et al. Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse , 2017, CCS.
[17] A. James. 2010 , 2011, Philo of Alexandria: an Annotated Bibliography 2007-2016.
[18] Wouter Joosen,et al. The Wolf of Name Street: Hijacking Domains Through Their Nameservers , 2017, CCS.
[19] Stefan Savage,et al. XXXtortion?: inferring registration intent in the .XXX TLD , 2014, WWW.
[20] Wouter Joosen,et al. Parking Sensors: Analyzing and Detecting Parked Domains , 2015, NDSS.
[21] Chris Kanich,et al. The Long "Taile" of Typosquatting Domain Names , 2014, USENIX Security Symposium.
[22] Giovanni Vigna,et al. Prophiler: a fast filter for the large-scale detection of malicious web pages , 2011, WWW.
[23] Nick Feamster,et al. PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration , 2016, CCS.
[24] Lawrence K. Saul,et al. Beyond blacklists: learning to detect malicious web sites from suspicious URLs , 2009, KDD.
[25] Nick Feamster,et al. Understanding the domain registration behavior of spammers , 2013, Internet Measurement Conference.
[26] Tyler Moore,et al. The Ghosts of Banking Past: Empirical Analysis of Closed Bank Websites , 2014, Financial Cryptography.