Traveling the silk road: a measurement analysis of a large anonymous online marketplace
暂无分享,去创建一个
[1] E. Kaplan,et al. Nonparametric Estimation from Incomplete Observations , 1958 .
[2] J. Caulkins,et al. Mandatory Minimum Drug Sentences: Throwing Away the Key or the Taxpayers' Money? , 1997 .
[3] J. Caulkins,et al. What Price Data Tell Us about Drug Markets , 1998 .
[4] J. Wooders,et al. Reputation in Auctions: Theory, and Evidence from Ebay , 2006 .
[5] P. Ludlow. Crypto Anarchy and Virtual Communities , 2001 .
[6] Paul Resnick,et al. Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.
[7] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[8] Paul F. Syverson,et al. Locating hidden servers , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[9] Steven J. Murdoch,et al. Hot or not: revealing hidden services by their clock skew , 2006, CCS '06.
[10] Christos H. Papadimitriou,et al. Free-riding and whitewashing in peer-to-peer systems , 2006, IEEE J. Sel. Areas Commun..
[11] Christos H. Papadimitriou,et al. Free-riding and whitewashing in peer-to-peer systems , 2004, IEEE Journal on Selected Areas in Communications.
[12] Hao Chen,et al. Spam double-funnel: connecting web spammers with advertisers , 2007, WWW '07.
[13] Stefan Savage,et al. An inquiry into the nature and causes of the wealth of internet miscreants , 2007, CCS '07.
[14] Tyler Moore,et al. Examining the impact of website take-down on phishing , 2007, eCrime '07.
[15] Chris Kanich,et al. The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff , 2008, LEET.
[16] S. Nakamoto,et al. Bitcoin: A Peer-to-Peer Electronic Cash System , 2008 .
[17] Dirk Grunwald,et al. Shining Light in Dark Places: Understanding the Tor Network , 2008, Privacy Enhancing Technologies.
[18] Nicolas Christin,et al. This is your data on drugs: lessons computer security can learn from the drug war , 2010, NSPW '10.
[19] Fernando Pérez-González,et al. Leaving timing-channel fingerprints in hidden service log files , 2010 .
[20] Tyler Moore,et al. Measuring the Perpetrators and Funders of Typosquatting , 2010, Financial Cryptography.
[21] David Schuff,et al. What Makes a Helpful Review? A Study of Customer Reviews on Amazon.com , 2010 .
[22] Stefan Savage,et al. Dirty Jobs: The Role of Freelance Labor in Web Service Abuse , 2011, USENIX Security Symposium.
[23] Tyler Moore,et al. Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade , 2011, USENIX Security Symposium.
[24] He Liu,et al. Click Trajectories: End-to-End Analysis of the Spam Value Chain , 2011, 2011 IEEE Symposium on Security and Privacy.
[25] Fergal Reid,et al. An Analysis of Anonymity in the Bitcoin System , 2011, PASSAT 2011.
[26] Stefan Savage,et al. An analysis of underground forums , 2011, IMC '11.
[27] Stefan Savage,et al. PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs , 2012, USENIX Security Symposium.
[28] Stefan Savage,et al. Priceless: the role of payments in abuse-advertised goods , 2012, CCS.