Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
73 | Anirudh Ramachandran, Nick Feamster, Santosh S. Vempala |
Filtering spam with behavioral blacklisting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 342-351, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, clustering, spam, botnets, blacklists |
40 | Linda Dailey Paulson |
News Briefs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 41(11), pp. 18-20, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | M. Patrick Collins, Timothy J. Shimeall, Sidney Faber, Jeff Janies, Rhiannon Weaver, Markus De Shon, Joseph B. Kadane |
Using uncleanliness to predict future botnet addresses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, IMC 2007, San Diego, California, USA, October 24-26, 2007, pp. 93-104, 2007, ACM, 978-1-59593-908-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
botnets, reputation management, blacklists |
26 | Miguel V. Carriegos, Noemí DeCastro-García, D. Escudero |
Towards Supercomputing Categorizing the Maliciousness upon Cybersecurity Blacklists with Concept Drift. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Math. Methods ![In: Comput. Math. Methods 2023, pp. 5780357:1-5780357:8, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Luca Deri, Francesco Fusco |
Evaluating IP Blacklists Effectiveness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.08356, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Wenhao Li, Yongqing He, Zhimin Wang, Saleh Mansor Alqahtani, Priyadarsi Nanda |
Uncovering Flaws in Anti-Phishing Blacklists for Phishing Websites Using Novel Cloaking Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: Proceedings of the 20th International Conference on Security and Cryptography, SECRYPT 2023, Rome, Italy, July 10-12, 2023., pp. 813-821, 2023, SCITEPRESS, 978-989-758-666-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Luca Deri, Francesco Fusco |
Evaluating IP Blacklists Effectiveness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FiCloud ![In: 10th International Conference on Future Internet of Things and Cloud, FiCloud 2023, Marrakesh, Morocco, August 14-16, 2023, pp. 336-343, 2023, IEEE, 979-8-3503-1635-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Martin Fejrskov, Jens Myrup Pedersen, Emmanouil Vasilomanolakis |
Using NetFlow to Measure the Impact of Deploying DNS-based Blacklists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm (1) ![In: Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part I, pp. 476-496, 2021, Springer, 978-3-030-90018-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Severin Engelmann, Mo Chen, Lorenz Dang, Jens Grossklags |
Blacklists and Redlists in the Chinese Social Credit System: Diversity, Flexibility, and Comprehensiveness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIES ![In: AIES '21: AAAI/ACM Conference on AI, Ethics, and Society, Virtual Event, USA, May 19-21, 2021, pp. 78-88, 2021, ACM, 978-1-4503-8473-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Adam Oest, Yeganeh Safaei, Penghui Zhang, Brad Wardman, Kevin Tyers, Yan Shoshitaishvili, Adam Doupé |
PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020, pp. 379-396, 2020, USENIX Association, 978-1-939133-17-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
26 | Sivaramakrishnan Ramanathan, Jelena Mirkovic, Minlan Yu |
BLAG: Improving the Accuracy of Blacklists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: 27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, February 23-26, 2020, 2020, The Internet Society, 1-891562-61-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
26 | Simon Bell, Peter Komisarczuk |
An Analysis of Phishing Blacklists: Google Safe Browsing, OpenPhish, and PhishTank. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSW ![In: Proceedings of the Australasian Computer Science Week, ACSW 2020, Melbourne, VIC, Australia, February 3-7, 2020, pp. 3:1-3:11, 2020, ACM, 978-1-4503-7697-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Katerina Demetzou |
Processing Operations 'Likely to Result in a High Risk to the Rights and Freedoms of Natural Persons' - Lessons to Be Learned from National Authorities' DPIA 'Blacklists'. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APF ![In: Privacy Technologies and Policy - 8th Annual Privacy Forum, APF 2020, Lisbon, Portugal, October 22-23, 2020, Proceedings, pp. 25-42, 2020, Springer, 978-3-030-55195-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Liza Potts, Rebekah Small, Michael Trice |
Boycotting the Knowledge Makers: How Reddit Demonstrates the Rise of Media Blacklists and Source Rejection in Online Communities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Prof. Commun. ![In: IEEE Trans. Prof. Commun. 62(4), pp. 351-363, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Akihiro Satoh, Yutaka Nakamura, Yutaka Fukuda, Kazuto Sasai, Gen Kitagata |
A Cause-Based Classification Approach for Malicious DNS Queries Detected Through Blacklists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 7, pp. 142991-143001, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Saad Sajid Hashmi, Muhammad Ikram 0001, Mohamed Ali Kâafar |
A Longitudinal Analysis of Online Ad-Blocking Blacklists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1906.00166, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
26 | Simon Bell, Kenny Paterson, Lorenzo Cavallaro |
Catch Me (On Time) If You Can: Understanding the Effectiveness of Twitter URL Blacklists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1912.02520, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
26 | Benjamin Zi Hao Zhao, Muhammad Ikram 0001, Hassan Jameel Asghar, Mohamed Ali Kâafar, Abdelberi Chaabane, Kanchana Thilakarathna |
A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1904.10629, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
26 | Benjamin Zi Hao Zhao, Muhammad Ikram 0001, Hassan Jameel Asghar, Mohamed Ali Kâafar, Abdelberi Chaabane, Kanchana Thilakarathna |
A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019, pp. 193-205, 2019, ACM, 978-1-4503-6752-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Adam Oest, Yeganeh Safaei, Adam Doupé, Gail-Joon Ahn, Brad Wardman, Kevin Tyers |
PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 2019 IEEE Symposium on Security and Privacy, SP 2019, San Francisco, CA, USA, May 19-23, 2019, pp. 1344-1361, 2019, IEEE, 978-1-5386-6660-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Saad Sajid Hashmi, Muhammad Ikram 0001, Mohamed Ali Kâafar |
A Longitudinal Analysis of Online Ad-Blocking Blacklists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN Symposium ![In: 2019 IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), Osnabrück, Germany, October 14-17, 2019, pp. 158-165, 2019, IEEE, 978-1-7281-2561-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Klavdija Kutnar, Dragan Marusic, Tomaz Pisanski |
Blacklists vs. Whitelists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ars Math. Contemp. ![In: Ars Math. Contemp. 15(2), 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
26 | Jienan Liu, Babak Rahbarinia, Roberto Perdisci, Haitao Du, Li Su |
Augmenting Telephone Spam Blacklists by Mining Large CDR Datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018, pp. 273-284, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Egon Kidmose, Kristian Gausel, Søren Brandbyge, Jens Myrup Pedersen |
Assessing Usefulness of Blacklists Without the Ground Truth. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IP&C ![In: Image Processing and Communications Challenges 10 - 10th International Conference, IP&C'2018, Bydgoszcz, Poland, 14-16 November 2018, Proceedings, pp. 216-223, 2018, Springer, 978-3-030-03657-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Sharbani Pandit, Roberto Perdisci, Mustaque Ahamad, Payas Gupta |
Towards Measuring the Effectiveness of Telephony Blacklists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, 2018, 2018, The Internet Society. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
26 | Diego V. Queiroz, Ruan Delgado Gomes, César Benavente-Peces, Iguatemi E. Fonseca, Marcelo S. Alencar |
Evaluation of Channels Blacklists in TSCH Networks with Star and Tree Topologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Q2SWinet@MSWiM ![In: Proceedings of the 14th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, Q2SWinet@MSWiM 2018, Montreal, QC, Canada, October 28 - November 02, 2018, pp. 116-123, 2018, ACM, 978-1-4503-5963-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Baris Coskun |
(Un)wisdom of Crowds: Accurately Spotting Malicious IP Clusters Using Not-So-Accurate IP Blacklists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 12(6), pp. 1406-1417, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
26 | David Gugelmann, Markus Happe, Bernhard Ager, Vincent Lenders |
An Automated Approach for Complementing Ad Blockers' Blacklists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. Priv. Enhancing Technol. ![In: Proc. Priv. Enhancing Technol. 2015(2), pp. 282-298, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
26 | |
Building and Measuring Privacy-Preserving Predictive Blacklists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1512.04114, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
26 | Stephanie Bayer, Jens Groth |
Zero-knowledge Argument for Polynomial Evaluation with Application to Blacklists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 195, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
26 | Nizar Kheir, Frédéric Tran, Pierre Caron, Nicolas Deschamps |
Mentor: Positive DNS Reputation to Skim-Off Benign Domains in Botnet C&C Blacklists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: ICT Systems Security and Privacy Protection - 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings, pp. 1-14, 2014, Springer, 978-3-642-55414-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Marc Kührer, Christian Rossow, Thorsten Holz |
Paint It Black: Evaluating the Effectiveness of Malware Blacklists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Research in Attacks, Intrusions and Defenses - 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings, pp. 1-21, 2014, Springer, 978-3-319-11378-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Yannai A. Gonczarowski |
Manipulation of stable matchings using minimal blacklists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC ![In: ACM Conference on Economics and Computation, EC '14, Stanford , CA, USA, June 8-12, 2014, pp. 449, 2014, ACM, 978-1-4503-2565-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Nikolaos Tsalis, Nikos Virvilis, Alexios Mylonas, Theodore K. Apostolopoulos, Dimitris Gritzalis |
Browser Blacklists: The Utopia of Phishing Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICETE (Selected Papers) ![In: E-Business and Telecommunications - 11th International Joint Conference, ICETE 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers, pp. 278-293, 2014, Springer, 978-3-319-25914-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Yannai A. Gonczarowski |
Manipulation of Stable Matchings using Minimal Blacklists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1307.7477, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
26 | Giovane Cesar Moreira Moura, Anna Sperotto, Ramin Sadre, Aiko Pras |
Evaluating third-party Bad Neighborhood blacklists for Spam detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IM ![In: 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), Ghent, Belgium, May 27-31, 2013, pp. 252-259, 2013, IEEE, 978-1-4673-5229-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
26 | Roel Peeters, Andreas Pashalidis |
Privacy-Friendly Checking of Remote Token Blacklists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDMAN ![In: Policies and Research in Identity Management - Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings, pp. 18-33, 2013, Springer, 978-3-642-37281-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Jing Zhang 0027, Ari Chivukula, Michael D. Bailey, Manish Karir, Mingyan Liu |
Characterization of Blacklists and Tainted Network Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAM ![In: Passive and Active Measurement - 14th International Conference, PAM 2013, Hong Kong, China, March 18-19, 2013. Proceedings, pp. 218-228, 2013, Springer, 978-3-642-36515-7. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Stephanie Bayer, Jens Groth |
Zero-Knowledge Argument for Polynomial Evaluation with Application to Blacklists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings, pp. 646-663, 2013, Springer, 978-3-642-38347-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Marc Kührer, Thorsten Holz |
An Empirical Analysis of Malware Blacklists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Prax. Inf.verarb. Kommun. ![In: Prax. Inf.verarb. Kommun. 35(1), pp. 11-16, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Jian Wu 0006, Pradeep B. Teregowda, Juan Pablo Fernández Ramírez, Prasenjit Mitra, Shuyi Zheng, C. Lee Giles |
The evolution of a crawling strategy for an academic document search engine: whitelists and blacklists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WebSci ![In: Web Science 2012, WebSci '12, Evanston, IL, USA - June 22 - 24, 2012, pp. 340-343, 2012, ACM, 978-1-4503-1228-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Andrew G. West, Insup Lee 0001 |
Towards the effective temporal association mining of spam blacklists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEAS ![In: The 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, CEAS 2011, Perth, Australia, September 1-2, 2011, Proceedings, pp. 73-82, 2011, ACM, 978-1-4503-0788-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | John R. Levine |
DNS Blacklists and Whitelists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 5782, pp. 1-11, February 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
26 | David Oro, Jesus Luna, Toni Felguera, Marc Vilanova, Jetzabel M. Serna |
Benchmarking IP blacklists for financial botnet detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Sixth International Conference on Information Assurance and Security, IAS 2010, Atlanta, GA, USA, August 23-25, 2010, pp. 62-67, 2010, IEEE, 978-1-4244-7407-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Michael Hirschbichler, Christoph Egger 0002, Othmar Pasteka, Andreas Berger |
Using E-Mail SPAM DNS Blacklists for Qualifying the SPAM-over-Internet-Telephony Probability of a SIP Call. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDS ![In: Third International Conference on the Digital Society (ICDS 2009), February 1-7, 2009, Cancun, Mexico, pp. 254-259, 2009, IEEE Computer Society, 978-0-7695-3526-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker |
Beyond blacklists: learning to detect malicious web sites from suspicious URLs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28 - July 1, 2009, pp. 1245-1254, 2009, ACM, 978-1-60558-495-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
malicious web sites, supervised learning, L1-regularization |
26 | Christian Dietrich 0005, Christian Rossow |
Empirical research of IP blacklists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSE ![In: ISSE 2008 - Securing Electronic Busines Processes, Highlights of the Information Security Solutions Europe 2008 Conference, 7-9 October 2008, Madrid, Spain, pp. 163-171, 2008, Vieweg+Teubner, 978-3-8348-0660-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Sushant Sinha, Michael D. Bailey, Farnam Jahanian |
Shades of grey: On the effectiveness of reputation-based "blacklists". ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 3rd International Conference on Malicious and Unwanted Software, MALWARE 2008, Alexandria, Virginia, USA, October 7-8, 2008, pp. 57-64, 2008, IEEE Computer Society, 978-1-4244-3288-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Christian J. Dietrich, Christian Rossow |
Empirische Untersuchung von IP-Blacklists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sicherheit ![In: Sicherheit 2008: Sicherheit, Schutz und Zuverlässigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 2.-4. April 2008 im Saarbrücker Schloss., pp. 545-549, 2008, GI, 978-3-88579-222-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
26 | Jian Zhang 0004, Phillip A. Porras, Johannes Ullrich |
A New Service for Increasing the Effectiveness of Network Address Blacklists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRUTI ![In: 3rd Workshop on Steps to Reducing Unwanted Traffic on the Internet, SRUTI'07, Santa Clara, CA, USA, June 18, 2007, 2007, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
26 | Duncan Cook, Jacky Hartnett, Kevin Manderson, Joel Scanlan |
Catching spam before it arrives: domain specific dynamic blacklists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSW ![In: The proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Tasmania, Australia, January 2006, pp. 193-202, 2006, Australian Computer Society, 1-920-68236-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
26 | Anirudh Ramachandran, David Dagon, Nick Feamster |
Can DNS-Based Blacklists Keep Up with Bots? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEAS ![In: CEAS 2006 - The Third Conference on Email and Anti-Spam, July 27-28, 2006, Mountain View, California, USA, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
20 | J. Lane Thames, Randal T. Abler, David Keeling |
Bit vector algorithms enabling high-speed and memory-efficient firewall blacklisting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 47th Annual Southeast Regional Conference, 2009, Clemson, South Carolina, USA, March 19-21, 2009, 2009, ACM, 978-1-60558-421-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
path matrix, firewalls, packet classification, blacklisting, bit vectors |
20 | Chen-Huei Chou, Atish P. Sinha, Huimin Zhao 0003 |
A text mining approach to Internet abuse detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. E Bus. Manag. ![In: Inf. Syst. E Bus. Manag. 6(4), pp. 419-439, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Internet abuse, Internet filtering, Text mining, Text categorization |
20 | Bertrand Mathieu, Saverio Niccolini, Dorgham Sisalem |
SDRS: A Voice-over-IP Spam Detection and Reaction System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 6(6), pp. 52-59, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Mohsen Sharifi, Seyed Hossein Siadati |
A phishing sites blacklist generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: The 6th ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2008, Doha, Qatar, March 31 - April 4, 2008, pp. 840-843, 2008, IEEE Computer Society, 978-1-4244-1967-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Ashok Khanal, Bahman S. Motlagh, Taskin Koçak |
Improving the Efficiency of Spam Filtering through Cache Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MASCOTS ![In: 15th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS 2007), October 24-26, 2007, Istanbul, Turkey, pp. 303-309, 2007, IEEE Computer Society, 978-1-4244-1854-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Tyler Moore 0001, Jolyon Clulow |
Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa, pp. 157-168, 2007, Springer, 978-0-387-72366-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Robert McGrew 0002, Rayford B. Vaughn |
Using Search Engines to Acquire Network Forensic Evidence. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP Int. Conf. Digital Forensics ![In: Advances in Digital Forensics III - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 28-31, 2007, pp. 247-253, 2007, Springer, 978-0-387-73741-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
evidence gathering, search engines, Network forensics |
20 | Yu Jin 0001, Esam Sharafuddin, Zhi-Li Zhang |
Identifying dynamic IP address blocks serendipitously through background scanning traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoNEXT ![In: Proceedings of the 2007 ACM Conference on Emerging Network Experiment and Technology, CoNEXT 2007, New York, NY, USA, December 10-13, 2007, pp. 4, 2007, ACM, 978-1-59593-770-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Christian Ludl, Sean McAllister, Engin Kirda, Christopher Kruegel |
On the Effectiveness of Techniques to Detect Phishing Sites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007, Proceedings, pp. 20-39, 2007, Springer, 978-3-540-73613-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Zhenhai Duan, Yingfei Dong, Kartik Gopalan |
DMTP: Controlling Spam Through Message Delivery Differentiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networking ![In: NETWORKING 2006 - Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems, 5th International IFIP-TC6 Networking Conference, Coimbra, Portugal, May 15-19, 2006, Proceedings, pp. 355-367, 2006, Springer, 3-540-34192-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Email Spam, Unwanted Internet Traffic, DMTP, SMTP |
20 | András A. Benczúr, István Bíró, Károly Csalogány, Máté Uher |
Detecting nepotistic links by language model disagreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 15th international conference on World Wide Web, WWW 2006, Edinburgh, Scotland, UK, May 23-26, 2006, pp. 939-940, 2006, ACM, 1-59593-323-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
language modeling, anchor text, link Spam |
20 | Stefan Katzenbeisser 0001, Klaus Kursawe, Joop Talstra |
Graceful infringement reactions in DRM systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the Sixth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006, pp. 89-96, 2006, ACM, 1-59593-555-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
device revocation, watermarking, DRM, perceptual hashes |
20 | Mikko T. Siponen, Carl Stucke |
Effective Anti-Spam Strategies in Companies: An International Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), CD-ROM / Abstracts Proceedings, 4-7 January 2006, Kauai, HI, USA, 2006, IEEE Computer Society, 0-7695-2507-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Isabel Drost, Tobias Scheffer |
Thwarting the Nigritude Ultramarine: Learning to Identify Link Spam. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECML ![In: Machine Learning: ECML 2005, 16th European Conference on Machine Learning, Porto, Portugal, October 3-7, 2005, Proceedings, pp. 96-107, 2005, Springer, 3-540-29243-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Wen-Yi Hsin, Shun-Chieh Lin, Shian-Shyong Tseng |
A Study of Alert-Based Collaborative Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPAN ![In: 8th International Symposium on Parallel Architectures, Algorithms, and Networks, ISPAN 2005, December 7-9. 2005, Las Vegas, Nevada, USA, pp. 148-153, 2005, IEEE Computer Society, 0-7695-2509-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | V. Bacarella, Fosca Giannotti, Mirco Nanni, Dino Pedreschi |
Discovery of ads web hosts through traffic data analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DMKD ![In: Proceedings of the 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, DMKD 2004, Paris, France, June 13, 2004, pp. 76-81, 2004, ACM, 1-58113-908-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Charles Higby, Michael Bailey |
Wireless security patch management system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGITE Conference ![In: Proceedings of the 5th Conference on Information Technology Education, SIGITE 2004, 2004, Salt Lake City, UT, USA, October 28-30, 2004, pp. 165-168, 2004, ACM, 1-58113-936-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security, wireless, configuration, update, worm, patch, virus, administration |