关注
Chris Kanich
标题
引用次数
引用次数
年份
Spamalytics: An empirical analysis of spam marketing conversion
C Kanich, C Kreibich, K Levchenko, B Enright, GM Voelker, V Paxson, ...
Proceedings of the 15th ACM conference on Computer and communications …, 2008
5922008
Click trajectories: End-to-end analysis of the spam value chain
K Levchenko, A Pitsillidis, N Chachra, B Enright, M Félegyházi, C Grier, ...
2011 ieee symposium on security and privacy, 431-446, 2011
3692011
Re:{CAPTCHAs—Understanding}{CAPTCHA-Solving} Services in an Economic Context
M Motoyama, K Levchenko, C Kanich, D McCoy, GM Voelker, S Savage
19th USENIX Security Symposium (USENIX Security 10), 2010
2992010
The long {“Taile”} of typosquatting domain names
J Szurdi, B Kocso, G Cseh, J Spring, M Felegyhazi, C Kanich
23rd USENIX Security Symposium (USENIX Security 14), 191-206, 2014
2032014
Show me the money: Characterizing spam-advertised revenue
C Kanich, N Weaver, D McCoy, T Halvorson, C Kreibich, K Levchenko, ...
20th USENIX Security Symposium (USENIX Security 11), 2011
1632011
Spamcraft: An Inside Look At Spam Campaign Orchestration.
C Kreibich, C Kanich, K Levchenko, B Enright, GM Voelker, V Paxson, ...
LEET, 2009
1372009
Botnet Judo: Fighting Spam with Itself.
A Pitsillidis, K Levchenko, C Kreibich, C Kanich, GM Voelker, V Paxson, ...
NDSS, 2010
1282010
On the spam campaign trail.
C Kreibich, C Kanich, K Levchenko, B Enright, GM Voelker, V Paxson, ...
LEET 8 (2008), 1-9, 2008
1222008
An empirical analysis of the commercial vpn ecosystem
MT Khan, J DeBlasio, GM Voelker, AC Snoeren, C Kanich, ...
Proceedings of the Internet Measurement Conference 2018, 443-456, 2018
1082018
The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff.
C Kanich, K Levchenko, B Enright, GM Voelker, S Savage
LEET 8, 1-9, 2008
992008
Gq: Practical containment for measuring modern malware systems
C Kreibich, N Weaver, C Kanich, W Cui, V Paxson
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011
912011
Fifteen minutes of unwanted fame: Detecting and characterizing doxing
P Snyder, P Doerfler, C Kanich, D McCoy
proceedings of the 2017 Internet Measurement Conference, 432-444, 2017
882017
O single {Sign-Off}, where art thou? An empirical analysis of single {Sign-On} account hijacking and session management on the web
M Ghasemisharif, A Ramesh, S Checkoway, C Kanich, J Polakis
27th USENIX Security Symposium (USENIX Security 18), 1475-1492, 2018
782018
Every second counts: Quantifying the negative externalities of cybercrime via typosquatting
MT Khan, X Huo, Z Li, C Kanich
2015 IEEE Symposium on Security and Privacy, 135-150, 2015
772015
Most websites don't need to vibrate: A cost-benefit approach to improving browser security
P Snyder, C Taylor, C Kanich
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
742017
Leveraging machine learning to improve unwanted resource filtering
S Bhagavatula, C Dunn, C Kanich, M Gupta, B Ziebart
Proceedings of the 2014 Workshop on Artificial Intelligent and Security …, 2014
612014
Taster's choice: a comparative analysis of spam feeds
A Pitsillidis, C Kanich, GM Voelker, K Levchenko, S Savage
Proceedings of the 2012 Internet Measurement Conference, 427-440, 2012
592012
Browser feature usage on the modern web
P Snyder, L Ansari, C Taylor, C Kanich
Proceedings of the 2016 Internet Measurement Conference, 97-110, 2016
572016
Deepauth: A framework for continuous user re-authentication in mobile apps
S Amini, V Noroozi, A Pande, S Gupte, PS Yu, C Kanich
Proceedings of the 27th ACM International Conference on Information and …, 2018
552018
Leveraging semantic transformation to investigate password habits and their causes
A Hanamsagar, SS Woo, C Kanich, J Mirkovic
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems …, 2018
532018
系统目前无法执行此操作,请稍后再试。
文章 1–20