F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida. Proceedings of the Seventh Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS), (July 2010)
K. Lee, J. Caverlee, and S. Webb. Proceeding of the 33rd international ACM SIGIR conference on Research and development in information retrieval, page 435--442. New York, NY, USA, ACM, (2010)
A. Wang. Data and Applications Security and Privacy XXIV, volume 6166 of Lecture Notes in Computer Science, chapter 25, Springer Berlin / Heidelberg, Berlin, Heidelberg, (2010)
C. Grier, K. Thomas, V. Paxson, and M. Zhang. Proceedings of the 17th ACM conference on Computer and communications security, page 27--37. New York, NY, USA, ACM, (2010)
S. Ghosh, G. Korlam, and N. Ganguly. Proceedings of the 20th international conference companion on World wide web, page 41--42. New York, NY, USA, ACM, (2011)
Z. Chu, S. Gianvecchio, H. Wang, and S. Jajodia. Conference, 2010 Annual Computer Security Applications Conference (ACSAC 2010), Austin, TX, USA - December 06 - 10, 2010, page 21--30. New York, NY, USA, ACM, (2010)
C. Yang, R. Harkreader, and G. Gu. Proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection (RAID'11)), (September 2011)
D. Sculley, and G. Wachman. Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval, page 415--422. New York, NY, USA, ACM, (2007)