Web PKI: Closing the Gap between Guidelines and Practices. | 7 | 0.61 | 2014 |
TransCom: A Virtual Disk-Based Cloud Computing Platform for Heterogeneous Services | 0 | 0.34 | 2014 |
Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures | 42 | 1.34 | 2013 |
Intention and Origination: An Inside Look at Large-Scale Bot Queries. | 4 | 0.52 | 2013 |
SocialWatch: detection of online service abuse via large-scale social graphs | 9 | 0.59 | 2013 |
Global authentication in an untrustworthy world | 10 | 0.74 | 2013 |
Early security classification of skype users via machine learning | 6 | 0.44 | 2013 |
Collaborative TCP sequence number inference attack: how to crack sequence number under a second | 36 | 1.26 | 2012 |
Populated IP addresses: classification and applications | 6 | 0.61 | 2012 |
Host Fingerprinting and Tracking on the Web: Privacy and Security Implications. | 58 | 3.91 | 2012 |
Knowing your enemy: understanding and detecting malicious web advertising | 67 | 2.24 | 2012 |
Innocent by association: early recognition of legitimate users | 18 | 0.65 | 2012 |
How user behavior is related to social affinity | 16 | 0.65 | 2012 |
Heat-seeking honeypots: design and experience | 14 | 0.95 | 2011 |
Optimizing data partitioning for data-parallel computing | 20 | 0.90 | 2011 |
Context-based online configuration-error detection | 20 | 0.74 | 2011 |
deSEO: combating search-result poisoning | 35 | 1.85 | 2011 |
On Network-level Clusters for Spam Detection. | 33 | 2.82 | 2010 |
SBotMiner: large scale search bot detection | 29 | 1.47 | 2010 |
How to tell an airport from a home: techniques and applications | 4 | 0.71 | 2010 |
Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique | 7 | 0.63 | 2010 |
Searching the searchers with searchaudit | 6 | 0.74 | 2010 |
BotGraph: large scale spamming botnet detection | 81 | 3.55 | 2009 |
De-anonymizing the internet using unreliable IDs | 16 | 1.09 | 2009 |
Less is More: Sparse Graph Mining with Compact Matrix Decomposition | 30 | 2.66 | 2008 |
Spamming botnets: signatures and characteristics | 184 | 9.68 | 2008 |
End-to-end web application security | 32 | 2.20 | 2007 |
How dynamic are IP addresses? | 95 | 7.14 | 2007 |
Forensic Analysis for Epidemic Attacks in Federated Networks | 19 | 1.00 | 2006 |
Virtual disk based centralized management for enterprise networks | 0 | 0.34 | 2006 |
Protecting Privacy in Key-Value Search Systems | 3 | 0.44 | 2006 |
Worm Origin Identification Using Random Moonwalks | 53 | 3.23 | 2005 |
Seurat: A Pointillist Approach to Anomaly Detection | 23 | 1.94 | 2004 |
A secure distributed search system | 4 | 0.48 | 2002 |
Locality in search engine queries and its implications for caching | 96 | 7.85 | 2002 |
Early measurements of a cluster-based architecture for P2P systems | 45 | 9.39 | 2001 |
A Secure, Publisher-Centric Web Caching Infrastructure | 12 | 1.04 | 2001 |