Chris Kanich
Título
Citado por
Citado por
Año
Spamalytics: An empirical analysis of spam marketing conversion
C Kanich, C Kreibich, K Levchenko, B Enright, GM Voelker, V Paxson, ...
Proceedings of the 15th ACM conference on Computer and communications …, 2008
5302008
Click trajectories: End-to-end analysis of the spam value chain
K Levchenko, A Pitsillidis, N Chachra, B Enright, M Félegyházi, C Grier, ...
2011 ieee symposium on security and privacy, 431-446, 2011
3042011
Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context.
M Motoyama, K Levchenko, C Kanich, D McCoy, GM Voelker, S Savage
USENIX Security Symposium 10, 3, 2010
2432010
Show Me the Money: Characterizing Spam-advertised Revenue.
C Kanich, N Weaver, D McCoy, T Halvorson, C Kreibich, K Levchenko, ...
USENIX Security Symposium 35, 2011
1482011
The long “taile” of typosquatting domain names
J Szurdi, B Kocso, G Cseh, J Spring, M Felegyhazi, C Kanich
23rd {USENIX} Security Symposium ({USENIX} Security 14), 191-206, 2014
1212014
Spamcraft: An Inside Look At Spam Campaign Orchestration.
C Kreibich, C Kanich, K Levchenko, B Enright, GM Voelker, V Paxson, ...
LEET, 2009
1212009
On the Spam Campaign Trail.
C Kreibich, C Kanich, K Levchenko, B Enright, GM Voelker, V Paxson, ...
LEET 8 (2008), 1-9, 2008
1172008
Botnet Judo: Fighting Spam with Itself.
A Pitsillidis, K Levchenko, C Kreibich, C Kanich, GM Voelker, V Paxson, ...
NDSS, 2010
1152010
The Heisenbot uncertainty problem: Challenges in separating bots from chaff
CKKLB Enright, GMVS Savage
902008
Gq: Practical containment for measuring modern malware systems
C Kreibich, N Weaver, C Kanich, W Cui, V Paxson
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011
822011
Every second counts: Quantifying the negative externalities of cybercrime via typosquatting
MT Khan, X Huo, Z Li, C Kanich
2015 IEEE Symposium on Security and Privacy, 135-150, 2015
572015
Taster's choice: a comparative analysis of spam feeds
A Pitsillidis, C Kanich, GM Voelker, K Levchenko, S Savage
Proceedings of the 2012 Internet Measurement Conference, 427-440, 2012
512012
Fifteen minutes of unwanted fame: Detecting and characterizing doxing
P Snyder, P Doerfler, C Kanich, D McCoy
Proceedings of the 2017 Internet Measurement Conference, 432-444, 2017
322017
Browser feature usage on the modern web
P Snyder, L Ansari, C Taylor, C Kanich
Proceedings of the 2016 Internet Measurement Conference, 97-110, 2016
302016
Leveraging machine learning to improve unwanted resource filtering
S Bhagavatula, C Dunn, C Kanich, M Gupta, B Ziebart
Proceedings of the 2014 Workshop on Artificial Intelligent and Security …, 2014
292014
Most websites don't need to vibrate: A cost-benefit approach to improving browser security
P Snyder, C Taylor, C Kanich
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
262017
No Plan Survives Contact: Experience with Cybercrime Measurement.
C Kanich, N Chachra, D McCoy, C Grier, DY Wang, M Motoyama, ...
CSET, 2011
262011
An empirical analysis of the commercial vpn ecosystem
MT Khan, J DeBlasio, GM Voelker, AC Snoeren, C Kanich, ...
Proceedings of the Internet Measurement Conference 2018, 443-456, 2018
222018
No Please, After You: Detecting Fraud in Affiliate Marketing Networks.
P Snyder, C Kanich
WEIS, 2015
222015
" I Saw Images I Didn't Even Know I Had" Understanding User Perceptions of Cloud Storage Privacy
JW Clark, P Snyder, D McCoy, C Kanich
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015
192015
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20