Honeycomb: creating intrusion detection signatures using honeypots C Kreibich, J Crowcroft ACM SIGCOMM computer communication review 34 (1), 51-56, 2004 | 1023 | 2004 |
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics C Kreibich, M Handley, V Paxson Proc. USENIX Security Symposium 2001, 2001 | 633 | 2001 |
Spamalytics: An empirical analysis of spam marketing conversion C Kanich, C Kreibich, K Levchenko, B Enright, GM Voelker, V Paxson, ... Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 539 | 2008 |
Netalyzr: Illuminating the edge network C Kreibich, N Weaver, B Nechaev, V Paxson Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 246-259, 2010 | 410 | 2010 |
Measuring pay-per-install: the commoditization of malware distribution. J Caballero, C Grier, C Kreibich, V Paxson Usenix security symposium 13, 2011 | 336 | 2011 |
Click trajectories: End-to-end analysis of the spam value chain K Levchenko, A Pitsillidis, N Chachra, B Enright, M Félegyházi, C Grier, ... 2011 ieee symposium on security and privacy, 431-446, 2011 | 319 | 2011 |
Dispatcher: Enabling active botnet infiltration using automatic protocol reverse-engineering J Caballero, P Poosankam, C Kreibich, D Song Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 311 | 2009 |
Unexpected means of protocol inference J Ma, K Levchenko, C Kreibich, S Savage, GM Voelker Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, 313-326, 2006 | 277 | 2006 |
Prudent practices for designing malware experiments: Status quo and outlook C Rossow, CJ Dietrich, C Grier, C Kreibich, V Paxson, N Pohlmann, ... 2012 IEEE Symposium on Security and Privacy, 65-79, 2012 | 207 | 2012 |
On the Potential of Proactive Domain Blacklisting. M Felegyhazi, C Kreibich, V Paxson LEET 10, 6-6, 2010 | 206 | 2010 |
Architecture of a network monitor A Moore, J Hall, C Kreibich, E Harris, I Pratt Passive & Active Measurement Workshop 2003, 2003 | 156 | 2003 |
Show Me the Money: Characterizing Spam-advertised Revenue. C Kanich, N Weaver, D McCoy, T Halvorson, C Kreibich, K Levchenko, ... USENIX Security Symposium 35, 2011 | 153 | 2011 |
Pharmaleaks: Understanding the business of online pharmaceutical affiliate programs D McCoy, A Pitsillidis, J Grant, N Weaver, C Kreibich, B Krebs, G Voelker, ... 21st {USENIX} Security Symposium ({USENIX} Security 12), 1-16, 2012 | 145 | 2012 |
Spamcraft: An Inside Look At Spam Campaign Orchestration. C Kreibich, C Kanich, K Levchenko, B Enright, GM Voelker, V Paxson, ... LEET, 2009 | 122 | 2009 |
On the Spam Campaign Trail. C Kreibich, C Kanich, K Levchenko, B Enright, GM Voelker, V Paxson, ... LEET 8 (2008), 1-9, 2008 | 121 | 2008 |
Botnet Judo: Fighting Spam with Itself. A Pitsillidis, K Levchenko, C Kreibich, C Kanich, GM Voelker, V Paxson, ... NDSS, 2010 | 117 | 2010 |
Apps, trackers, privacy, and regulators: A global study of the mobile tracking ecosystem A Razaghpanah, R Nithyanand, N Vallina-Rodriguez, S Sundaresan, ... | 110 | 2018 |
What’s clicking what? techniques and innovations of today’s clickbots B Miller, P Pearce, C Grier, C Kreibich, V Paxson International Conference on Detection of Intrusions and Malware, and …, 2011 | 103 | 2011 |
Understanding the domain registration behavior of spammers S Hao, M Thomas, V Paxson, N Feamster, C Kreibich, C Grier, ... Proceedings of the 2013 conference on Internet measurement conference, 63-76, 2013 | 97 | 2013 |
Fathom: A browser-based network measurement platform M Dhawan, J Samuel, R Teixeira, C Kreibich, M Allman, N Weaver, ... Proceedings of the 2012 Internet Measurement Conference, 73-86, 2012 | 95 | 2012 |