Characterizing Long-tail SEO Spam on Cloud Web Hosting Services
暂无分享,去创建一个
Elaine Shi | Raheem A. Beyah | Chang Liu | Damon McCoy | Shuang Hao | Xiaojing Liao | E. Shi | Damon McCoy | R. Beyah | Chang Liu | Xiaojing Liao | S. Hao
[1] He Liu,et al. Click Trajectories: End-to-End Analysis of the Spam Value Chain , 2011, 2011 IEEE Symposium on Security and Privacy.
[2] Vern Paxson,et al. Measuring Pay-per-Install: The Commoditization of Malware Distribution , 2011, USENIX Security Symposium.
[3] Hector Garcia-Molina,et al. Combating Web Spam with TrustRank , 2004, VLDB.
[4] Michael K. Reiter,et al. Cross-Tenant Side-Channel Attacks in PaaS Clouds , 2014, CCS.
[5] Martín Abadi,et al. deSEO: Combating Search-Result Poisoning , 2011, USENIX Security Symposium.
[6] Dan Gusfield,et al. Efficient algorithms for inferring evolutionary trees , 1991, Networks.
[7] Thomas Lavergne,et al. Tracking Web spam with HTML style similarities , 2008, TWEB.
[8] Tyler Moore,et al. Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade , 2011, USENIX Security Symposium.
[9] Stefan Savage,et al. PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs , 2012, USENIX Security Symposium.
[10] Dmitry Samosseiko,et al. THE PARTNERKA - WHAT IS IT, AND WHY SHOULD YOU CARE? , 2009 .
[11] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[12] Alan A. Lew,et al. Long Tail Tourism: New Geographies For Marketing Niche Tourism Products , 2008 .
[13] Chris Kanich,et al. Spamalytics: an empirical analysis of spam marketing conversion , 2009, CACM.
[14] J. Platt. Sequential Minimal Optimization : A Fast Algorithm for Training Support Vector Machines , 1998 .
[15] Stefan Savage,et al. Cloak and dagger: dynamics of web search cloaking , 2011, CCS '11.
[16] Tyler Moore,et al. Fashion crimes: trending-term exploitation on the web , 2011, CCS '11.
[17] Lawrence K. Saul,et al. Knock it off: profiling the online storefronts of counterfeit merchandise , 2014, KDD.
[18] Amy Nicole Langville,et al. Google's PageRank and beyond - the science of search engine rankings , 2006 .
[19] Tyler Moore,et al. A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning , 2014, CCS.
[20] Stefan Savage,et al. Manufacturing compromise: the emergence of exploit-as-a-service , 2012, CCS.
[21] Marc Najork,et al. Detecting spam web pages through content analysis , 2006, WWW '06.
[22] Edgar R. Weippl,et al. Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space , 2011, USENIX Security Symposium.
[23] Tyler Moore,et al. The E-Commerce Market for "Lemons": Identification and Analysis of Websites Selling Counterfeit Goods , 2015, WWW.
[24] Eli Upfal,et al. Probability and Computing: Randomized Algorithms and Probabilistic Analysis , 2005 .
[25] Zhou Li,et al. Understanding the Dark Side of Domain Parking , 2014, USENIX Security Symposium.
[26] Brian D. Davison,et al. Identifying link farm spam pages , 2005, WWW '05.
[27] Xiao Han,et al. The Role of Cloud Services in Malicious Software: Trends and Insights , 2015, DIMVA.