Andreas Pitsillidis
Andreas Pitsillidis
Verified email at
Cited by
Cited by
Click trajectories: End-to-end analysis of the spam value chain
K Levchenko, A Pitsillidis, N Chachra, B Enright, M Félegyházi, C Grier, ...
2011 ieee symposium on security and privacy, 431-446, 2011
Manufacturing compromise: the emergence of exploit-as-a-service
C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Pharmaleaks: Understanding the business of online pharmaceutical affiliate programs
D McCoy, A Pitsillidis, J Grant, N Weaver, C Kreibich, B Krebs, G Voelker, ...
Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security …, 2012
Botnet Judo: Fighting Spam with Itself.
A Pitsillidis, K Levchenko, C Kreibich, C Kanich, GM Voelker, V Paxson, ...
NDSS, 2010
Handcrafted fraud and extortion: Manual account hijacking in the wild
E Bursztein, B Benko, D Margolis, T Pietraszek, A Archer, A Aquino, ...
Proceedings of the 2014 conference on internet measurement conference, 347-358, 2014
Taster's choice: a comparative analysis of spam feeds
A Pitsillidis, C Kanich, GM Voelker, K Levchenko, S Savage
Proceedings of the 2012 Internet Measurement Conference, 427-440, 2012
Automatic identification of travel and non-travel network addresses
F Yu, Y Xie, M Abadi, SR Savage, GM Voelker, A Pitsillidis
US Patent 8,615,605, 2013
How to tell an airport from a home: Techniques and applications
A Pitsillidis, Y Xie, F Yu, M Abadi, GM Voelker, S Savage
Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks, 1-6, 2010
Browser Exploits as a Service: The Monetization of Driveby Downloads
C Grier, L Ballard, J Caballero, N Chachra, C Dietrich, K Levchenko, ...
Spam value chain: defensive intervention analysis
A Pitsillidis
UC San Diego, 2013
D McCoy, A Pitsillidis, G Jordan, N Weaver, C Kreibich
The system can't perform the operation now. Try again later.
Articles 1–11