Folgen
Chris Kanich
Titel
Zitiert von
Zitiert von
Jahr
Spamalytics: An empirical analysis of spam marketing conversion
C Kanich, C Kreibich, K Levchenko, B Enright, GM Voelker, V Paxson, ...
Proceedings of the 15th ACM conference on Computer and communications …, 2008
5972008
Click trajectories: End-to-end analysis of the spam value chain
K Levchenko, A Pitsillidis, N Chachra, B Enright, M Félegyházi, C Grier, ...
2011 ieee symposium on security and privacy, 431-446, 2011
3692011
Re:{CAPTCHAs—Understanding}{CAPTCHA-Solving} Services in an Economic Context
M Motoyama, K Levchenko, C Kanich, D McCoy, GM Voelker, S Savage
19th USENIX Security Symposium (USENIX Security 10), 2010
3052010
The long {“Taile”} of typosquatting domain names
J Szurdi, B Kocso, G Cseh, J Spring, M Felegyhazi, C Kanich
23rd USENIX Security Symposium (USENIX Security 14), 191-206, 2014
2092014
Show me the money: Characterizing spam-advertised revenue
C Kanich, N Weaver, D McCoy, T Halvorson, C Kreibich, K Levchenko, ...
20th USENIX Security Symposium (USENIX Security 11), 2011
1652011
Spamcraft: An Inside Look At Spam Campaign Orchestration.
C Kreibich, C Kanich, K Levchenko, B Enright, GM Voelker, V Paxson, ...
LEET, 2009
1372009
Botnet Judo: Fighting Spam with Itself.
A Pitsillidis, K Levchenko, C Kreibich, C Kanich, GM Voelker, V Paxson, ...
NDSS, 2010
1282010
On the spam campaign trail.
C Kreibich, C Kanich, K Levchenko, B Enright, GM Voelker, V Paxson, ...
LEET 8 (2008), 1-9, 2008
1222008
An empirical analysis of the commercial vpn ecosystem
MT Khan, J DeBlasio, GM Voelker, AC Snoeren, C Kanich, ...
Proceedings of the Internet Measurement Conference 2018, 443-456, 2018
1142018
The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff.
C Kanich, K Levchenko, B Enright, GM Voelker, S Savage
LEET 8, 1-9, 2008
992008
Fifteen minutes of unwanted fame: Detecting and characterizing doxing
P Snyder, P Doerfler, C Kanich, D McCoy
proceedings of the 2017 Internet Measurement Conference, 432-444, 2017
932017
Gq: Practical containment for measuring modern malware systems
C Kreibich, N Weaver, C Kanich, W Cui, V Paxson
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011
912011
O single {Sign-Off}, where art thou? An empirical analysis of single {Sign-On} account hijacking and session management on the web
M Ghasemisharif, A Ramesh, S Checkoway, C Kanich, J Polakis
27th USENIX Security Symposium (USENIX Security 18), 1475-1492, 2018
832018
Every second counts: Quantifying the negative externalities of cybercrime via typosquatting
MT Khan, X Huo, Z Li, C Kanich
2015 IEEE Symposium on Security and Privacy, 135-150, 2015
812015
Most websites don't need to vibrate: A cost-benefit approach to improving browser security
P Snyder, C Taylor, C Kanich
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
742017
Leveraging machine learning to improve unwanted resource filtering
S Bhagavatula, C Dunn, C Kanich, M Gupta, B Ziebart
Proceedings of the 2014 Workshop on Artificial Intelligent and Security …, 2014
622014
Taster's choice: a comparative analysis of spam feeds
A Pitsillidis, C Kanich, GM Voelker, K Levchenko, S Savage
Proceedings of the 2012 Internet Measurement Conference, 427-440, 2012
602012
Deepauth: A framework for continuous user re-authentication in mobile apps
S Amini, V Noroozi, A Pande, S Gupte, PS Yu, C Kanich
Proceedings of the 27th ACM International Conference on Information and …, 2018
582018
Browser feature usage on the modern web
P Snyder, L Ansari, C Taylor, C Kanich
Proceedings of the 2016 Internet Measurement Conference, 97-110, 2016
582016
Leveraging semantic transformation to investigate password habits and their causes
A Hanamsagar, SS Woo, C Kanich, J Mirkovic
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems …, 2018
552018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20