On Hit Inflation Techniques and Detection in Streams of Web Advertising Networks
暂无分享,去创建一个
[1] Stelvio Cimato,et al. SAWM: a tool for secure and authenticated web metering , 2002, SEKE '02.
[2] Akira Tanaka,et al. The Worst-Case Time Complexity for Generating All Maximal Cliques , 2004, COCOON.
[3] Farnam Jahanian,et al. The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets , 2005, SRUTI.
[4] Andreas Terzis,et al. A multifaceted approach to understanding the botnet phenomenon , 2006, IMC '06.
[5] 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), June 25-29, 2007, Toronto, Ontario, Canada , 2007, ICDCS Workshops.
[6] Chris J. Mitchell,et al. Enhancing the Security of Cookies , 2001, ICISC.
[7] Divyakant Agrawal,et al. Duplicate detection in click streams , 2005, WWW '05.
[8] Daniel V. Klein. Defending Against the Wily Surfer-Web-based Attacks and Defenses , 1999, Workshop on Intrusion Detection and Network Monitoring.
[9] Benny Pinkas,et al. On the Security of Pay-per-Click and Other Web Advertising Schemes , 1999, Comput. Networks.
[10] Divyakant Agrawal,et al. Detectives: detecting coalition hit inflation attacks in advertising networks streams , 2007, WWW '07.
[11] Markus Jakobsson,et al. Secure and Lightweight Advertising on the Web , 1999, Comput. Networks.
[12] Alan J. Broder. Data Mining, the Internet, and Privacy , 1999, WEBKDD.
[13] Li Fan,et al. Summary cache: a scalable wide-area web cache sharing protocol , 2000, TNET.
[14] Geoffrey Zweig,et al. Syntactic Clustering of the Web , 1997, Comput. Networks.
[15] Philip S. Yu,et al. The state of the art in locally distributed Web-server systems , 2002, CSUR.
[16] Divyakant Agrawal,et al. Using Association Rules for Fraud Detection in Web Advertising Networks , 2005, VLDB.
[17] Moni Naor,et al. Secure and Efficient Metering , 1998, EUROCRYPT.
[18] Donna L. Hoffman,et al. New metrics for new media: toward the development of Web measurement standards , 1997, World Wide Web J..
[19] Alan M. Frieze,et al. Min-wise independent permutations (extended abstract) , 1998, STOC '98.
[20] Moses Charikar,et al. Similarity estimation techniques from rounding algorithms , 2002, STOC '02.
[21] Geoff Shaw. Spyware: Spyware & Adware: the Risks facing Businesses , 2003 .
[22] Michael K. Reiter,et al. Detecting Hit Shaving in Click-Through Payment Schemes , 1998, USENIX Workshop on Electronic Commerce.
[23] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.