Concentrating Correctly on Cybercrime Concentration
暂无分享,去创建一个
[1] He Liu,et al. Click Trajectories: End-to-End Analysis of the Spam Value Chain , 2011, 2011 IEEE Symposium on Security and Privacy.
[2] Tyler Moore,et al. A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning , 2014, CCS.
[3] Tyler Moore,et al. Examining the impact of website take-down on phishing , 2007, eCrime '07.
[4] Tyler Moore,et al. The consequence of non-cooperation in the fight against phishing , 2008, 2008 eCrime Researchers Summit.
[5] R. Clayton. How much did shutting down McColo help ? , 2009 .
[6] Christopher Krügel,et al. Clickonomics: Determining the Effect of Anti-Piracy Measures for One-Click Hosting , 2013, NDSS.
[7] Richard Clayton,et al. Orchestrated crime: The high yield investment fraud ecosystem , 2014, 2014 APWG Symposium on Electronic Crime Research (eCrime).
[8] Chris Kanich,et al. The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff , 2008, LEET.
[9] Christopher Krügel,et al. The Underground Economy of Fake Antivirus Software , 2011, WEIS.
[10] He Liu,et al. On the Effects of Registrar-level Intervention , 2011, LEET.
[11] Nicolas Christin,et al. Dissecting one click frauds , 2010, CCS '10.
[12] Tyler Moore,et al. The Postmodern Ponzi Scheme: Empirical Analysis of High-Yield Investment Programs , 2012, Financial Cryptography.
[13] Tyler Moore,et al. Measuring the Perpetrators and Funders of Typosquatting , 2010, Financial Cryptography.
[14] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[15] Nicolas Christin,et al. Traveling the silk road: a measurement analysis of a large anonymous online marketplace , 2012, WWW.
[16] Lorrie Faith Cranor,et al. An Empirical Analysis of Phishing Blacklists , 2009, CEAS 2009.
[17] Stefan Savage,et al. Priceless: the role of payments in abuse-advertised goods , 2012, CCS.
[18] Brian Krebs. Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door , 2014 .
[19] Tyler Moore,et al. Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade , 2011, USENIX Security Symposium.
[20] Chris Kanich,et al. The Long "Taile" of Typosquatting Domain Names , 2014, USENIX Security Symposium.
[21] Lawrence K. Saul,et al. Search + Seizure: The Effectiveness of Interventions on SEO Campaigns , 2014, Internet Measurement Conference.
[22] Johannes M. Bauer,et al. The Role of Internet Service Providers in Botnet Mitigation an Empirical Analysis Based on Spam Data , 2010, WEIS.
[23] Daniel Massey,et al. Analyzing the Aftermath of the McColo Shutdown , 2009, 2009 Ninth Annual International Symposium on Applications and the Internet.
[24] T. Moore,et al. Pick your poison: pricing and inventories at unlicensed online pharmacies , 2013, EC '13.