Title |
Conference |
Tags |
Characterizing Large-Scale Click Fraud in ZeroAccess |
CCS-2014 - Scottsdale,USA |
|
Consequences of Connectivity: Characterizing Account Hijacking on Twitter |
CCS-2014 - Scottsdale,USA |
|
Hulk: Eliciting Malicious Behavior in Browser Extensions |
usenix-2014 - san diego,usa |
|
Botcoin: Monetizing Stolen Cycles |
NDSS-2014 - San Diego,USA |
|
Network Security |
USENIX-2013 - Washington, D.C. |
|
Traf?cking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse |
USENIX-2013 - Washington, D.C. |
|
What's Clicking What? Techniques and Innovations of Today's Clickbots |
9th Conference on Detection of Intrusions and Malware & Vulnerability Assessment-2012 - Heraklion, Crete, Greece |
|
Adapting Social Spam Infrastructure for Political Censorship |
5th USENIX Workshop on Large-Scale Exploits and Emergent Threats-2012 - San Francisco, USA |
Socialbots
Big Data
|
What's Clicking What? Techniques and Innovations of Today's Clickbots |
dimva-2011 - Amsterdam,Netherkands |
|
Insights From The Inside: A View Of Botnet Management From Infiltration |
3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats-2010 - San Jose, USA |
Security
|
The Multi-Principal Os Construction Of The Gazelle Web Browser |
18th USENIX Security Symposium-2009 - Montreal, Canada |
Security
Web
Browser
|
Designing And Implementing Malicious Hardware |
1st USENIX Workshop on Large-Scale Exploits and Emergent Threats-2008 - San Francisco, USA |
Security
|