Chris Kanich
Cited by
Cited by
Spamalytics: An empirical analysis of spam marketing conversion
C Kanich, C Kreibich, K Levchenko, B Enright, GM Voelker, V Paxson, ...
Proceedings of the 15th ACM conference on Computer and communications …, 2008
Click trajectories: End-to-end analysis of the spam value chain
K Levchenko, A Pitsillidis, N Chachra, B Enright, M Félegyházi, C Grier, ...
2011 ieee symposium on security and privacy, 431-446, 2011
Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context.
M Motoyama, K Levchenko, C Kanich, D McCoy, GM Voelker, S Savage
USENIX Security Symposium 10, 3, 2010
Show Me the Money: Characterizing Spam-advertised Revenue.
C Kanich, N Weaver, D McCoy, T Halvorson, C Kreibich, K Levchenko, ...
USENIX Security Symposium 35, 2011
The long “taile” of typosquatting domain names
J Szurdi, B Kocso, G Cseh, J Spring, M Felegyhazi, C Kanich
23rd {USENIX} Security Symposium ({USENIX} Security 14), 191-206, 2014
Spamcraft: An Inside Look At Spam Campaign Orchestration.
C Kreibich, C Kanich, K Levchenko, B Enright, GM Voelker, V Paxson, ...
LEET, 2009
On the Spam Campaign Trail.
C Kreibich, C Kanich, K Levchenko, B Enright, GM Voelker, V Paxson, ...
LEET 8 (2008), 1-9, 2008
Botnet Judo: Fighting Spam with Itself.
A Pitsillidis, K Levchenko, C Kreibich, C Kanich, GM Voelker, V Paxson, ...
NDSS, 2010
The Heisenbot uncertainty problem: Challenges in separating bots from chaff
CKKLB Enright, GMVS Savage
Gq: Practical containment for measuring modern malware systems
C Kreibich, N Weaver, C Kanich, W Cui, V Paxson
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011
Every second counts: Quantifying the negative externalities of cybercrime via typosquatting
MT Khan, X Huo, Z Li, C Kanich
2015 IEEE Symposium on Security and Privacy, 135-150, 2015
Taster's choice: a comparative analysis of spam feeds
A Pitsillidis, C Kanich, GM Voelker, K Levchenko, S Savage
Proceedings of the 2012 Internet Measurement Conference, 427-440, 2012
Fifteen minutes of unwanted fame: Detecting and characterizing doxing
P Snyder, P Doerfler, C Kanich, D McCoy
Proceedings of the 2017 Internet Measurement Conference, 432-444, 2017
Browser feature usage on the modern web
P Snyder, L Ansari, C Taylor, C Kanich
Proceedings of the 2016 Internet Measurement Conference, 97-110, 2016
Leveraging machine learning to improve unwanted resource filtering
S Bhagavatula, C Dunn, C Kanich, M Gupta, B Ziebart
Proceedings of the 2014 Workshop on Artificial Intelligent and Security …, 2014
Most websites don't need to vibrate: A cost-benefit approach to improving browser security
P Snyder, C Taylor, C Kanich
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
No Plan Survives Contact: Experience with Cybercrime Measurement.
C Kanich, N Chachra, D McCoy, C Grier, DY Wang, M Motoyama, ...
CSET, 2011
No Please, After You: Detecting Fraud in Affiliate Marketing Networks.
P Snyder, C Kanich
WEIS, 2015
An empirical analysis of the commercial vpn ecosystem
MT Khan, J DeBlasio, GM Voelker, AC Snoeren, C Kanich, ...
Proceedings of the Internet Measurement Conference 2018, 443-456, 2018
" I Saw Images I Didn't Even Know I Had" Understanding User Perceptions of Cloud Storage Privacy
JW Clark, P Snyder, D McCoy, C Kanich
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015
The system can't perform the operation now. Try again later.
Articles 1–20