Author of the publication

SURF: detecting and measuring search poisoning.

, , and . ACM Conference on Computer and Communications Security, page 467-476. ACM, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SURF: detecting and measuring search poisoning., , and . ACM Conference on Computer and Communications Security, page 467-476. ACM, (2011)Still Beheading Hydras: Botnet Takedowns Then and Now., , and . IEEE Trans. Dependable Secur. Comput., 14 (5): 535-549 (2017)Towards Measuring the Effectiveness of Telephony Blacklists., , , and . NDSS, The Internet Society, (2018)Real-Time Detection of Malware Downloads via Large-Scale URL->File->Machine Graph Mining., , and . AsiaCCS, page 783-794. ACM, (2016)Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis., , and . IEEE Trans. Dependable Secur. Comput., 9 (5): 714-726 (2012)Network Intrusion Detection by Combining One-Class Classifiers., , and . ICIAP, volume 3617 of Lecture Notes in Computer Science, page 58-65. Springer, (2005)VAMO: towards a fully automated malware clustering validity analysis., and . ACSAC, page 329-338. ACM, (2012)Understanding the prevalence and use of alternative plans in malware with network games., , , and . ACSAC, page 1-10. ACM, (2011)Beheading hydras: performing effective botnet takedowns., , , , and . ACM Conference on Computer and Communications Security, page 121-132. ACM, (2013)Detecting and Tracking the Rise of DGA-Based Malware., , , and . login Usenix Mag., (2012)