What You See is NOT What You Get: Discovering and Tracking Social Engineering Attack Campaigns
暂无分享,去创建一个
[1] Gianluca Stringhini,et al. Shady paths: leveraging surfing crowds to detect malicious web pages , 2013, CCS.
[2] Jong Kim,et al. WarningBird: Detecting Suspicious URLs in Twitter Stream , 2012, NDSS.
[3] Gianluca Stringhini,et al. Stranger danger: exploring the ecosystem of ad-based URL shortening services , 2014, WWW.
[4] Manos Antonakakis,et al. Exposing Search and Advertisement Abuse Tactics and Infrastructure of Technical Support Scammers , 2018, WWW.
[5] Fang Yu,et al. Knowing your enemy: understanding and detecting malicious web advertising , 2012, CCS '12.
[6] Christopher Krügel,et al. Understanding fraudulent activities in online ad exchanges , 2011, IMC '11.
[7] Wouter Joosen,et al. It's Free for a Reason: Exploring the Ecosystem of Free Live Streaming Services , 2016, NDSS.
[8] Jan Panero Benway,et al. Banner Blindness: The Irony of Attention Grabbing on the World Wide Web , 1998 .
[9] Gianluca Stringhini,et al. Screenshot Classifier annotated images pHashes of non-screenshot annotated images Know Your Meme Generic Annotation Sites Meme Annotation Sites Generic Web Communities , 2018 .
[10] Wouter Joosen,et al. Parking Sensors: Analyzing and Detecting Parked Domains , 2015, NDSS.
[11] Xiao Zhang,et al. Betrayed by Your Dashboard: Discovering Malicious Campaigns via Web Analytics , 2018, WWW.
[12] William K. Robertson,et al. Surveylance: Automatically Detecting Online Survey Scams , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[13] Christo Wilson,et al. Tracing Information Flows Between Ad Exchanges Using Retargeted Ads , 2018, USENIX Security Symposium.
[14] Gianluca Stringhini,et al. The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements , 2014, Internet Measurement Conference.
[15] Roberto Perdisci,et al. Towards Measuring and Mitigating Social Engineering Software Download Attacks , 2016, USENIX Security Symposium.
[16] Fang Yu,et al. Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures , 2013, 2013 IEEE Symposium on Security and Privacy.
[17] Bo Li,et al. JSgraph: Enabling Reconstruction of Web Attacks via Efficient Tracking of Live In-Browser JavaScript Executions , 2018, NDSS.
[18] Nick Nikiforakis,et al. Dial One for Scam: A Large-Scale Analysis of Technical Support Scams , 2016, NDSS.
[19] Wenke Lee,et al. SURF: detecting and measuring search poisoning , 2011, CCS '11.