What Happens After You Are Pwnd : Understanding The Use Of Leaked Account Credentials In The Wild
暂无分享,去创建一个
[1] T. W. Anderson,et al. Asymptotic Theory of Certain "Goodness of Fit" Criteria Based on Stochastic Processes , 1952 .
[2] A. Martin-Löf. On the composition of elementary errors , 1994 .
[3] Yiming Yang,et al. Introducing the Enron Corpus , 2004, CEAS.
[4] Bradley Taylor,et al. Sender Reputation in a Large Webmail Service , 2006, CEAS.
[5] Marti A. Hearst,et al. Why phishing works , 2006, CHI.
[6] Xuxian Jiang,et al. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities , 2006, NDSS.
[7] Markus Jakobsson,et al. Social phishing , 2007, CACM.
[8] Calton Pu,et al. Social Honeypots: Making Friends With A Spammer Near You , 2008, CEAS.
[9] Arvind Krishnamurthy,et al. Studying Spamming Botnets Using Botlab , 2009, NSDI.
[10] Christopher Krügel,et al. Your botnet is my botnet: analysis of a botnet takeover , 2009, CCS.
[11] Amr M. Youssef,et al. On the analysis of the Zeus botnet crimeware toolkit , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.
[12] Kyumin Lee,et al. The social honeypot project: protecting online communities from spammers , 2010, WWW '10.
[13] Virgílio A. F. Almeida,et al. Detecting Spammers on Twitter , 2010 .
[14] Gianluca Stringhini,et al. Detecting spammers on social networks , 2010, ACSAC '10.
[15] Dawn Xiaodong Song,et al. Suspended accounts in retrospect: an analysis of twitter spam , 2011, IMC '11.
[16] Gianluca Stringhini,et al. The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns , 2011, LEET.
[17] Wouter Joosen,et al. Exposing the Lack of Privacy in File Hosting Services , 2011, LEET.
[18] Konstantin Beznosov,et al. The socialbot network: when bots socialize for fame and money , 2011, ACSAC '11.
[19] Tao Wei,et al. How many eyes are spying on your shared folders? , 2012, WPES '12.
[20] Herbert Bos,et al. Prudent Practices for Designing Malware Experiments: Status Quo and Outlook , 2012, 2012 IEEE Symposium on Security and Privacy.
[21] Gang Wang,et al. Northeastern University , 2021, IEEE Pulse.
[22] Wouter Joosen,et al. Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting , 2013, 2013 IEEE Symposium on Security and Privacy.
[23] Vern Paxson,et al. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse , 2013, USENIX Security Symposium.
[24] Gianluca Stringhini,et al. COMPA: Detecting Compromised Accounts on Social Networks , 2013, NDSS.
[25] Christopher Krügel,et al. Hulk: Eliciting Malicious Behavior in Browser Extensions , 2014, USENIX Security Symposium.
[26] Stefan Savage,et al. Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild , 2014, Internet Measurement Conference.
[27] Nikita Borisov,et al. The Tangled Web of Password Reuse , 2014, NDSS.
[28] Ariel Stolerman,et al. Doppelgänger Finder: Taking Stylometry to the Underground , 2014, 2014 IEEE Symposium on Security and Privacy.
[29] Gianluca Stringhini,et al. That Ain't You: Blocking Spearphishing Through Behavioral Modelling , 2015, DIMVA.
[30] Ping Wang,et al. Targeted Online Password Guessing: An Underestimated Threat , 2016, CCS.
[31] Gianluca Stringhini,et al. Honey Sheets: What Happens to Leaked Google Spreadsheets? , 2016, CSET @ USENIX Security Symposium.
[32] S. Santhosinidevi,et al. Towards Detecting Compromised Accounts on Social Networks , 2018 .