Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Chris Kanich
@article{DBLP:journals/corr/abs-2403-05638, author = {John Kristoff and Moritz M{\"{u}}ller and Arturo Filast{\`{o}} and Max Resing and Chris Kanich and Niels ten Oever}, title = {Internet Sanctions on Russian Media: Actions and Effects}, journal = {CoRR}, volume = {abs/2403.05638}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.05638}, doi = {10.48550/ARXIV.2403.05638}, eprinttype = {arXiv}, eprint = {2403.05638}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-05638.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BalashAKWKA23, author = {David G. Balash and Mir Masood Ali and Monica Kodwani and Xiaoyuan Wu and Chris Kanich and Adam J. Aviv}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Poster: Longitudinal Measurement of the Adoption Dynamics in Apple's Privacy Label Ecosystem}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {3600--3602}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3624383}, doi = {10.1145/3576915.3624383}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BalashAKWKA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/NawrockiKHKSW23, author = {Marcin Nawrocki and John Kristoff and Raphael Hiesgen and Chris Kanich and Thomas C. Schmidt and Matthias W{\"{a}}hlisch}, title = {SoK: {A} Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots}, booktitle = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2023, Delft, Netherlands, July 3-7, 2023}, pages = {576--591}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuroSP57164.2023.00041}, doi = {10.1109/EUROSP57164.2023.00041}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/NawrockiKHKSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/AliCGKNP23, author = {Mir Masood Ali and Binoy Chitale and Mohammad Ghasemisharif and Chris Kanich and Nick Nikiforakis and Jason Polakis}, title = {Navigating Murky Waters: Automated Browser Feature Testing for Uncovering Tracking Vectors}, booktitle = {30th Annual Network and Distributed System Security Symposium, {NDSS} 2023, San Diego, California, USA, February 27 - March 3, 2023}, publisher = {The Internet Society}, year = {2023}, url = {https://www.ndss-symposium.org/ndss-paper/navigating-murky-waters-automated-browser-feature-testing-for-uncovering-tracking-vectors/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/AliCGKNP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-04614, author = {Marcin Nawrocki and John Kristoff and Raphael Hiesgen and Chris Kanich and Thomas C. Schmidt and Matthias W{\"{a}}hlisch}, title = {SoK: {A} Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots}, journal = {CoRR}, volume = {abs/2302.04614}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.04614}, doi = {10.48550/ARXIV.2302.04614}, eprinttype = {arXiv}, eprint = {2302.04614}, timestamp = {Mon, 13 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-04614.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-17063, author = {Mir Masood Ali and David G. Balash and Chris Kanich and Adam J. Aviv}, title = {Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels Compared to Apps' Privacy Policies}, journal = {CoRR}, volume = {abs/2306.17063}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.17063}, doi = {10.48550/ARXIV.2306.17063}, eprinttype = {arXiv}, eprint = {2306.17063}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-17063.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/OhKMP22, author = {ChangSeok Oh and Chris Kanich and Damon McCoy and Paul Pearce}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Cart-ology: Intercepting Targeted Advertising via Ad Network Identity Entanglement}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {2401--2414}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560641}, doi = {10.1145/3548606.3560641}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/OhKMP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eaamo/SinghSKK22, author = {Shubham Singh and Bhuvni Shah and Chris Kanich and Ian A. Kash}, title = {Fair Decision-Making for Food Inspections}, booktitle = {Equity and Access in Algorithms, Mechanisms, and Optimization, {EAAMO} 2022, Arlington, VA, USA, October 6-9, 2022}, pages = {5:1--5:11}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3551624.3555289}, doi = {10.1145/3551624.3555289}, timestamp = {Wed, 26 Oct 2022 08:54:49 +0200}, biburl = {https://dblp.org/rec/conf/eaamo/SinghSKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GhasemisharifKP22, author = {Mohammad Ghasemisharif and Chris Kanich and Jason Polakis}, title = {Towards Automated Auditing for Account and Session Management Flaws in Single Sign-On Deployments}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {1774--1790}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833753}, doi = {10.1109/SP46214.2022.9833753}, timestamp = {Thu, 21 Sep 2023 15:57:27 +0200}, biburl = {https://dblp.org/rec/conf/sp/GhasemisharifKP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-02658, author = {David G. Balash and Mir Masood Ali and Xiaoyuan Wu and Chris Kanich and Adam J. Aviv}, title = {Longitudinal Analysis of Privacy Labels in the Apple App Store}, journal = {CoRR}, volume = {abs/2206.02658}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.02658}, doi = {10.48550/ARXIV.2206.02658}, eprinttype = {arXiv}, eprint = {2206.02658}, timestamp = {Tue, 14 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-02658.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/SolomosKKP21, author = {Konstantinos Solomos and John Kristoff and Chris Kanich and Jason Polakis}, title = {Tales of Favicons and Caches: Persistent Tracking in Modern Browsers}, booktitle = {28th Annual Network and Distributed System Security Symposium, {NDSS} 2021, virtually, February 21-25, 2021}, publisher = {The Internet Society}, year = {2021}, url = {https://www.ndss-symposium.org/ndss-paper/tales-of-favicons-and-caches-persistent-tracking-in-modern-browsers/}, timestamp = {Thu, 17 Jun 2021 15:42:26 +0200}, biburl = {https://dblp.org/rec/conf/ndss/SolomosKKP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pam/KristoffGKP21, author = {John Kristoff and Mohammad Ghasemisharif and Chris Kanich and Jason Polakis}, editor = {Oliver Hohlfeld and Andra Lutu and Dave Levin}, title = {Plight at the End of the Tunnel - Legacy IPv6 Transition Mechanisms in the Wild}, booktitle = {Passive and Active Measurement - 22nd International Conference, {PAM} 2021, Virtual Event, March 29 - April 1, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12671}, pages = {390--405}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-72582-2\_23}, doi = {10.1007/978-3-030-72582-2\_23}, timestamp = {Tue, 30 Mar 2021 18:55:05 +0200}, biburl = {https://dblp.org/rec/conf/pam/KristoffGKP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Khan0SVKUZ21, author = {Mohammad Taha Khan and Christopher Tran and Shubham Singh and Dimitri Vasilkov and Chris Kanich and Blase Ur and Elena Zheleva}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Helping Users Automatically Find and Manage Sensitive, Expendable Files in Cloud Storage}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1145--1162}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/khan-mohammad}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/Khan0SVKUZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/TianKPP20, author = {Huixin Tian and Chris Kanich and Jason Polakis and Sameer Patil}, title = {Tech Pains: Characterizations of Lived Cybersecurity Experiences}, booktitle = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P Workshops 2020, Genoa, Italy, September 7-11, 2020}, pages = {250--259}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EuroSPW51379.2020.00040}, doi = {10.1109/EUROSPW51379.2020.00040}, timestamp = {Thu, 29 Oct 2020 11:34:40 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/TianKPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/KristoffBKMPSW20, author = {John Kristoff and Randy Bush and Chris Kanich and George Michaelson and Amreesh Phokeer and Thomas C. Schmidt and Matthias W{\"{a}}hlisch}, title = {On Measuring {RPKI} Relying Parties}, booktitle = {{IMC} '20: {ACM} Internet Measurement Conference, Virtual Event, USA, October 27-29, 2020}, pages = {484--491}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3419394.3423622}, doi = {10.1145/3419394.3423622}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/KristoffBKMPSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MondalYHKTTKUZ19, author = {Mainack Mondal and G{\"{u}}nce Su Yilmaz and Noah Hirsch and Mohammad Taha Khan and Michael Tang and Christopher Tran and Chris Kanich and Blase Ur and Elena Zheleva}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Moving Beyond Set-It-And-Forget-It Privacy Settings on Social Media}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {991--1008}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3354202}, doi = {10.1145/3319535.3354202}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MondalYHKTTKUZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/AminiNBYK18, author = {Sara Amini and Vahid Noroozi and Sara Bahaadini and Philip S. Yu and Chris Kanich}, editor = {Naoki Abe and Huan Liu and Calton Pu and Xiaohua Hu and Nesreen K. Ahmed and Mu Qiao and Yang Song and Donald Kossmann and Bing Liu and Kisung Lee and Jiliang Tang and Jingrui He and Jeffrey S. Saltz}, title = {DeepFP: {A} Deep Learning Framework For User Fingerprinting via Mobile Motion Sensors}, booktitle = {{IEEE} International Conference on Big Data {(IEEE} BigData 2018), Seattle, WA, USA, December 10-13, 2018}, pages = {84--91}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/BigData.2018.8622372}, doi = {10.1109/BIGDATA.2018.8622372}, timestamp = {Fri, 19 Nov 2021 16:08:20 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/AminiNBYK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/KhanHKU18, author = {Mohammad Taha Khan and Maria Hyun and Chris Kanich and Blase Ur}, editor = {Regan L. Mandryk and Mark Hancock and Mark Perry and Anna L. Cox}, title = {Forgotten But Not Gone: Identifying the Need for Longitudinal Data Management in Cloud Storage}, booktitle = {Proceedings of the 2018 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2018, Montreal, QC, Canada, April 21-26, 2018}, pages = {543}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3173574.3174117}, doi = {10.1145/3173574.3174117}, timestamp = {Fri, 12 Mar 2021 15:28:42 +0100}, biburl = {https://dblp.org/rec/conf/chi/KhanHKU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/HanamsagarWKM18, author = {Ameya Hanamsagar and Simon S. Woo and Chris Kanich and Jelena Mirkovic}, editor = {Regan L. Mandryk and Mark Hancock and Mark Perry and Anna L. Cox}, title = {Leveraging Semantic Transformation to Investigate Password Habits and Their Causes}, booktitle = {Proceedings of the 2018 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2018, Montreal, QC, Canada, April 21-26, 2018}, pages = {570}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3173574.3174144}, doi = {10.1145/3173574.3174144}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/HanamsagarWKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/AminiNPGYK18, author = {Sara Amini and Vahid Noroozi and Amit Pande and Satyajit Gupte and Philip S. Yu and Chris Kanich}, editor = {Alfredo Cuzzocrea and James Allan and Norman W. Paton and Divesh Srivastava and Rakesh Agrawal and Andrei Z. Broder and Mohammed J. Zaki and K. Sel{\c{c}}uk Candan and Alexandros Labrinidis and Assaf Schuster and Haixun Wang}, title = {DeepAuth: {A} Framework for Continuous User Re-authentication in Mobile Apps}, booktitle = {Proceedings of the 27th {ACM} International Conference on Information and Knowledge Management, {CIKM} 2018, Torino, Italy, October 22-26, 2018}, pages = {2027--2035}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3269206.3272034}, doi = {10.1145/3269206.3272034}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cikm/AminiNPGYK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/KhanDVSKV18, author = {Mohammad Taha Khan and Joe DeBlasio and Geoffrey M. Voelker and Alex C. Snoeren and Chris Kanich and Narseo Vallina{-}Rodriguez}, title = {An Empirical Analysis of the Commercial {VPN} Ecosystem}, booktitle = {Proceedings of the Internet Measurement Conference 2018, {IMC} 2018, Boston, MA, USA, October 31 - November 02, 2018}, pages = {443--456}, publisher = {{ACM}}, year = {2018}, url = {https://dl.acm.org/citation.cfm?id=3278570}, timestamp = {Fri, 25 Oct 2019 09:51:49 +0200}, biburl = {https://dblp.org/rec/conf/imc/KhanDVSKV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/TahirRAKZKC18, author = {Rashid Tahir and Ali Raza and Faizan Ahmad and Jehangir Kazi and Fareed Zaffar and Chris Kanich and Matthew Caesar}, title = {It's All in the Name: Why Some URLs are More Vulnerable to Typosquatting}, booktitle = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018, Honolulu, HI, USA, April 16-19, 2018}, pages = {2618--2626}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/INFOCOM.2018.8486271}, doi = {10.1109/INFOCOM.2018.8486271}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/TahirRAKZKC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GhasemisharifRC18, author = {Mohammad Ghasemisharif and Amrutha Ramesh and Stephen Checkoway and Chris Kanich and Jason Polakis}, editor = {William Enck and Adrienne Porter Felt}, title = {O Single Sign-Off, Where Art Thou? An Empirical Analysis of Single Sign-On Account Hijacking and Session Management on the Web}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {1475--1492}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/ghasemisharif}, timestamp = {Mon, 01 Feb 2021 08:43:20 +0100}, biburl = {https://dblp.org/rec/conf/uss/GhasemisharifRC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigcas/Kanich17, author = {Chris Kanich}, title = {The costs and benefits of treating the browser like an operating system: how ad blockers help us better understand how different browser features are used and who they benefit}, journal = {{SIGCAS} Comput. Soc.}, volume = {47}, number = {2}, pages = {16--18}, year = {2017}, url = {https://doi.org/10.1145/3112644.3112647}, doi = {10.1145/3112644.3112647}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigcas/Kanich17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SnyderTK17, author = {Peter Snyder and Cynthia Bagier Taylor and Chris Kanich}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Most Websites Don't Need to Vibrate: {A} Cost-Benefit Approach to Improving Browser Security}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {179--194}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133966}, doi = {10.1145/3133956.3133966}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SnyderTK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/AminiK17, author = {Sara Amini and Chris Kanich}, title = {Characterizing the impact of malware infections and remediation attempts through support forum analysis}, booktitle = {2017 {APWG} Symposium on Electronic Crime Research, eCrime 2017, Phoenix, AZ, USA, April 25-27, 2017}, pages = {70--78}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ECRIME.2017.7945056}, doi = {10.1109/ECRIME.2017.7945056}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/AminiK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdm/BrugereKB17, author = {Ivan Brugere and Chris Kanich and Tanya Y. Berger{-}Wolf}, editor = {Raju Gottumukkala and Xia Ning and Guozhu Dong and Vijay Raghavan and Srinivas Aluru and George Karypis and Lucio Miele and Xindong Wu}, title = {Network Model Selection for Task-Focused Attributed Network Inference}, booktitle = {2017 {IEEE} International Conference on Data Mining Workshops, {ICDM} Workshops 2017, New Orleans, LA, USA, November 18-21, 2017}, pages = {118--125}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICDMW.2017.21}, doi = {10.1109/ICDMW.2017.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdm/BrugereKB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/SnyderDKM17, author = {Peter Snyder and Periwinkle Doerfler and Chris Kanich and Damon McCoy}, editor = {Steve Uhlig and Olaf Maennel}, title = {Fifteen minutes of unwanted fame: detecting and characterizing doxing}, booktitle = {Proceedings of the 2017 Internet Measurement Conference, {IMC} 2017, London, United Kingdom, November 1-3, 2017}, pages = {432--444}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3131365.3131385}, doi = {10.1145/3131365.3131385}, timestamp = {Fri, 25 Oct 2019 09:51:18 +0200}, biburl = {https://dblp.org/rec/conf/imc/SnyderDKM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BrugereKB17, author = {Ivan Brugere and Chris Kanich and Tanya Y. Berger{-}Wolf}, title = {A General Framework For Task-Oriented Network Inference}, journal = {CoRR}, volume = {abs/1705.00645}, year = {2017}, url = {http://arxiv.org/abs/1705.00645}, eprinttype = {arXiv}, eprint = {1705.00645}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BrugereKB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BrugereKB17aa, author = {Ivan Brugere and Chris Kanich and Tanya Y. Berger{-}Wolf}, title = {Evaluating Social Networks Using Task-Focused Network Inference}, journal = {CoRR}, volume = {abs/1707.02385}, year = {2017}, url = {http://arxiv.org/abs/1707.02385}, eprinttype = {arXiv}, eprint = {1707.02385}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BrugereKB17aa.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-06303, author = {Ivan Brugere and Chris Kanich and Tanya Y. Berger{-}Wolf}, title = {Network Model Selection for Task-Focused Attributed Network Inference}, journal = {CoRR}, volume = {abs/1708.06303}, year = {2017}, url = {http://arxiv.org/abs/1708.06303}, eprinttype = {arXiv}, eprint = {1708.06303}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-06303.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-08510, author = {Peter Snyder and Cynthia Bagier Taylor and Chris Kanich}, title = {Most Websites Don't Need to Vibrate: {A} Cost-Benefit Approach to Improving Browser Security}, journal = {CoRR}, volume = {abs/1708.08510}, year = {2017}, url = {http://arxiv.org/abs/1708.08510}, eprinttype = {arXiv}, eprint = {1708.08510}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-08510.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/SnyderK16, author = {Peter Snyder and Chris Kanich}, title = {Characterizing fraud and its ramifications in affiliate marketing networks}, journal = {J. Cybersecur.}, volume = {2}, number = {1}, pages = {71--81}, year = {2016}, url = {https://doi.org/10.1093/cybsec/tyw006}, doi = {10.1093/CYBSEC/TYW006}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/SnyderK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/SnyderATK16, author = {Peter Snyder and Lara Ansari and Cynthia Bagier Taylor and Chris Kanich}, editor = {Phillipa Gill and John S. Heidemann and John W. Byers and Ramesh Govindan}, title = {Browser Feature Usage on the Modern Web}, booktitle = {Proceedings of the 2016 {ACM} on Internet Measurement Conference, {IMC} 2016, Santa Monica, CA, USA, November 14-16, 2016}, pages = {97--110}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2987466}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/SnyderATK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SnyderATK16, author = {Peter Snyder and Lara Ansari and Cynthia Bagier Taylor and Chris Kanich}, title = {Browser Feature Usage on the Modern Web}, journal = {CoRR}, volume = {abs/1605.06467}, year = {2016}, url = {http://arxiv.org/abs/1605.06467}, eprinttype = {arXiv}, eprint = {1605.06467}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/SnyderATK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/ClarkSMK15, author = {Jason W. Clark and Peter Snyder and Damon McCoy and Chris Kanich}, editor = {Bo Begole and Jinwoo Kim and Kori Inkpen and Woontack Woo}, title = {"I Saw Images {I} Didn't Even Know {I} Had": Understanding User Perceptions of Cloud Storage Privacy}, booktitle = {Proceedings of the 33rd Annual {ACM} Conference on Human Factors in Computing Systems, {CHI} 2015, Seoul, Republic of Korea, April 18-23, 2015}, pages = {1641--1644}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2702123.2702535}, doi = {10.1145/2702123.2702535}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/chi/ClarkSMK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/SnyderK15, author = {Peter Snyder and Chris Kanich}, editor = {Jaehong Park and Anna Cinzia Squicciarini}, title = {One Thing Leads to Another: Credential Based Privilege Escalation}, booktitle = {Proceedings of the 5th {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015}, pages = {135--137}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2699026.2699127}, doi = {10.1145/2699026.2699127}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/SnyderK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/KhanK15, author = {Mohammad Taha Khan and Chris Kanich}, editor = {Ben Zevenbergen}, title = {High Fidelity, High Risk, High Reward: Using High-Fidelity Networking Data in Ethically Sound Research}, booktitle = {Proceedings of the 2015 {ACM} {SIGCOMM} Workshop on Ethics in Networked Systems Research, {NS} Ethics@SIGCOMM 2015, London, United Kingdom, August 21, 2015}, pages = {23--26}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2793013.2793024}, doi = {10.1145/2793013.2793024}, timestamp = {Tue, 06 Nov 2018 11:07:11 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/KhanK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KhanHLK15, author = {Mohammad Taha Khan and Xiang Huo and Zhou Li and Chris Kanich}, title = {Every Second Counts: Quantifying the Negative Externalities of Cybercrime via Typosquatting}, booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose, CA, USA, May 17-21, 2015}, pages = {135--150}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SP.2015.16}, doi = {10.1109/SP.2015.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/KhanHLK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/SnyderK15, author = {Peter Snyder and Chris Kanich}, title = {No Please, After You: Detecting Fraud in Affiliate Marketing Networks}, booktitle = {14th Annual Workshop on the Economics of Information Security, {WEIS} 2015, Delft, The Netherlands, 22-23 June, 2015}, year = {2015}, url = {http://www.econinfosec.org/archive/weis2015/papers/WEIS\_2015\_snyder.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/weis/SnyderK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigcas/SnyderK14, author = {Peter Snyder and Chris Kanich}, title = {Cloudsweeper and data-centric security}, journal = {{SIGCAS} Comput. Soc.}, volume = {44}, number = {2}, pages = {8--10}, year = {2014}, url = {https://doi.org/10.1145/2656870.2656872}, doi = {10.1145/2656870.2656872}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigcas/SnyderK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BhagavatulaDKGZ14, author = {Sruti Bhagavatula and Christopher W. Dunn and Chris Kanich and Minaxi Gupta and Brian D. Ziebart}, editor = {Christos Dimitrakakis and Aikaterini Mitrokotsa and Benjamin I. P. Rubinstein and Gail{-}Joon Ahn}, title = {Leveraging Machine Learning to Improve Unwanted Resource Filtering}, booktitle = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014}, pages = {95--102}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666652.2666662}, doi = {10.1145/2666652.2666662}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BhagavatulaDKGZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SzurdiKCSFK14, author = {Janos Szurdi and Balazs Kocso and Gabor Cseh and Jonathan M. Spring and M{\'{a}}rk F{\'{e}}legyh{\'{a}}zi and Chris Kanich}, editor = {Kevin Fu and Jaeyeon Jung}, title = {The Long "Taile" of Typosquatting Domain Names}, booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014}, pages = {191--206}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/szurdi}, timestamp = {Wed, 21 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/SzurdiKCSFK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2014cset, editor = {Chris Kanich and Patrick Lardieri}, title = {7th Workshop on Cyber Security Experimentation and Test, {CSET} '14, San Diego, CA, USA, August 18, 2014}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/cset14}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/2014cset.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SnyderK13, author = {Peter Snyder and Chris Kanich}, editor = {Ari Juels and Bryan Parno}, title = {CloudSweeper: enabling data-centric document management for secure cloud archives}, booktitle = {CCSW'13, Proceedings of the 2013 {ACM} Cloud Computing Security Workshop, Co-located with {CCS} 2013, Berlin, Germany, November 4, 2013}, pages = {47--54}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517488.2517495}, doi = {10.1145/2517488.2517495}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SnyderK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/daglib/p/GargCK13, author = {Vaibhav Garg and L. Jean Camp and Chris Kanich}, editor = {Rainer B{\"{o}}hme}, title = {Analysis of Ecrime in Crowd-Sourced Labor Markets: Mechanical Turk vs. Freelancer}, booktitle = {The Economics of Information Security and Privacy}, pages = {301--321}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39498-0\_13}, doi = {10.1007/978-3-642-39498-0\_13}, timestamp = {Tue, 16 May 2017 14:01:33 +0200}, biburl = {https://dblp.org/rec/books/daglib/p/GargCK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2013cset, editor = {Chris Kanich and Micah Sherr}, title = {6th Workshop on Cyber Security Experimentation and Test, {CSET} '13, Washington, D.C., USA, August 12, 2013}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/cset13}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/2013cset.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Kanich12, author = {Chris Kanich}, title = {Characterizing internet scams through underground infrastructure infiltration}, school = {University of California, San Diego, {USA}}, year = {2012}, url = {https://www.escholarship.org/uc/item/7q22j2fb}, timestamp = {Wed, 15 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Kanich12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/PitsillidisKVLS12, author = {Andreas Pitsillidis and Chris Kanich and Geoffrey M. Voelker and Kirill Levchenko and Stefan Savage}, editor = {John W. Byers and Jim Kurose and Ratul Mahajan and Alex C. Snoeren}, title = {Taster's choice: a comparative analysis of spam feeds}, booktitle = {Proceedings of the 12th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} '12, Boston, MA, USA, November 14-16, 2012}, pages = {427--440}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2398776.2398821}, doi = {10.1145/2398776.2398821}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/PitsillidisKVLS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/GargKC12, author = {Vaibhav Garg and Chris Kanich and L. Jean Camp}, title = {Analysis of eCrime in Crowd-sourced Labor Markets: Mechanical Turk vs. Freelancer}, booktitle = {11th Annual Workshop on the Economics of Information Security, {WEIS} 2012, Berlin, Germany, 25-26 June, 2012}, year = {2012}, url = {http://weis2012.econinfosec.org/papers/Garg\_WEIS2012.pdf}, timestamp = {Thu, 22 Jul 2021 16:15:45 +0200}, biburl = {https://dblp.org/rec/conf/weis/GargKC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/KreibichWKCP11, author = {Christian Kreibich and Nicholas Weaver and Chris Kanich and Weidong Cui and Vern Paxson}, editor = {Patrick Thiran and Walter Willinger}, title = {{GQ:} practical containment for measuring modern malware systems}, booktitle = {Proceedings of the 11th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} '11, Berlin, Germany, November 2-, 2011}, pages = {397--412}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2068816.2068854}, doi = {10.1145/2068816.2068854}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/KreibichWKCP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LevchenkoPCEFGHKKLMWPVS11, author = {Kirill Levchenko and Andreas Pitsillidis and Neha Chachra and Brandon Enright and M{\'{a}}rk F{\'{e}}legyh{\'{a}}zi and Chris Grier and Tristan Halvorson and Chris Kanich and Christian Kreibich and He Liu and Damon McCoy and Nicholas Weaver and Vern Paxson and Geoffrey M. Voelker and Stefan Savage}, title = {Click Trajectories: End-to-End Analysis of the Spam Value Chain}, booktitle = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May 2011, Berkeley, California, {USA}}, pages = {431--446}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SP.2011.24}, doi = {10.1109/SP.2011.24}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/LevchenkoPCEFGHKKLMWPVS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KanichCM11a, author = {Chris Kanich and Stephen Checkoway and Keaton Mowery}, editor = {David Brumley and Michal Zalewski}, title = {Putting Out a {HIT:} Crowdsourcing Malware Installs}, booktitle = {5th {USENIX} Workshop on Offensive Technologies, WOOT'11, August 8, 2011, San Francisco, CA, USA, Proceedings}, pages = {71--80}, publisher = {{USENIX} Association}, year = {2011}, url = {http://static.usenix.org/event/woot11/tech/final\_files/Kanich.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/KanichCM11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KanichCMGWMLSV11, author = {Chris Kanich and Neha Chachra and Damon McCoy and Chris Grier and David Y. Wang and Marti Motoyama and Kirill Levchenko and Stefan Savage and Geoffrey M. Voelker}, editor = {Sean Peisert and Stephen Schwab}, title = {No Plan Survives Contact: Experience with Cybercrime Measurement}, booktitle = {4th Workshop on Cyber Security Experimentation and Test, {CSET} '11, San Francisco, CA, USA, August 8, 2011}, publisher = {{USENIX} Association}, year = {2011}, url = {https://www.usenix.org/conference/cset11/no-plan-survives-contact-experience-cybercrime-measurement}, timestamp = {Mon, 01 Feb 2021 08:43:02 +0100}, biburl = {https://dblp.org/rec/conf/uss/KanichCMGWMLSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KanichWMHKLPVS11, author = {Chris Kanich and Nicholas Weaver and Damon McCoy and Tristan Halvorson and Christian Kreibich and Kirill Levchenko and Vern Paxson and Geoffrey M. Voelker and Stefan Savage}, title = {Show Me the Money: Characterizing Spam-advertised Revenue}, booktitle = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings}, publisher = {{USENIX} Association}, year = {2011}, url = {http://static.usenix.org/events/sec11/tech/full\_papers/Kanich.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/KanichWMHKLPVS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/PitsillidisLKKVPWS10, author = {Andreas Pitsillidis and Kirill Levchenko and Christian Kreibich and Chris Kanich and Geoffrey M. Voelker and Vern Paxson and Nicholas Weaver and Stefan Savage}, title = {Botnet Judo: Fighting Spam with Itself}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March 2010}, publisher = {The Internet Society}, year = {2010}, url = {https://www.ndss-symposium.org/ndss2010/botnet-judo-fighting-spam-itself}, timestamp = {Mon, 01 Feb 2021 08:42:17 +0100}, biburl = {https://dblp.org/rec/conf/ndss/PitsillidisLKKVPWS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MotoyamaLKMVS10, author = {Marti Motoyama and Kirill Levchenko and Chris Kanich and Damon McCoy and Geoffrey M. Voelker and Stefan Savage}, title = {Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context}, booktitle = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13, 2010, Proceedings}, pages = {435--462}, publisher = {{USENIX} Association}, year = {2010}, url = {http://www.usenix.org/events/sec10/tech/full\_papers/Motoyama.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/MotoyamaLKMVS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/KanichKLEVPS09, author = {Chris Kanich and Christian Kreibich and Kirill Levchenko and Brandon Enright and Geoffrey M. Voelker and Vern Paxson and Stefan Savage}, title = {Spamalytics: an empirical analysis of spam marketing conversion}, journal = {Commun. {ACM}}, volume = {52}, number = {9}, pages = {99--107}, year = {2009}, url = {https://doi.org/10.1145/1562164.1562190}, doi = {10.1145/1562164.1562190}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/KanichKLEVPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/leet/KreibichKLEVPS09, author = {Christian Kreibich and Chris Kanich and Kirill Levchenko and Brandon Enright and Geoffrey M. Voelker and Vern Paxson and Stefan Savage}, editor = {Wenke Lee}, title = {Spamcraft: An Inside Look At Spam Campaign Orchestration}, booktitle = {2nd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats, {LEET} '09, Boston, MA, USA, April 21, 2009}, publisher = {{USENIX} Association}, year = {2009}, url = {https://www.usenix.org/conference/leet-09/spamcraft-inside-look-spam-campaign-orchestration}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/leet/KreibichKLEVPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/EnrightVSKL08, author = {Brandon Enright and Geoff Voelker and Stefan Savage and Chris Kanich and Kirill Levchenko}, title = {Storm: When Researchers Collide}, journal = {login Usenix Mag.}, volume = {33}, number = {4}, year = {2008}, url = {https://www.usenix.org/publications/login/august-2008-volume-33-number-4/storm-when-researchers-collide}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/EnrightVSKL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KanichKLEVPS08, author = {Chris Kanich and Christian Kreibich and Kirill Levchenko and Brandon Enright and Geoffrey M. Voelker and Vern Paxson and Stefan Savage}, editor = {Peng Ning and Paul F. Syverson and Somesh Jha}, title = {Spamalytics: an empirical analysis of spam marketing conversion}, booktitle = {Proceedings of the 2008 {ACM} Conference on Computer and Communications Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008}, pages = {3--14}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1455770.1455774}, doi = {10.1145/1455770.1455774}, timestamp = {Tue, 10 Nov 2020 19:59:27 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KanichKLEVPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/KanichLEVS08, author = {Chris Kanich and Kirill Levchenko and Brandon Enright and Geoffrey M. Voelker and Stefan Savage}, editor = {Fabian Monrose}, title = {The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff}, booktitle = {First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats, {LEET} '08, San Francisco, CA, USA, April 15, 2008, Proceedings}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/leet08/tech/full\_papers/kanich/kanich.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nsdi/KanichLEVS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/KreibichKLEVPS08, author = {Christian Kreibich and Chris Kanich and Kirill Levchenko and Brandon Enright and Geoffrey M. Voelker and Vern Paxson and Stefan Savage}, editor = {Fabian Monrose}, title = {On the Spam Campaign Trail}, booktitle = {First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats, {LEET} '08, San Francisco, CA, USA, April 15, 2008, Proceedings}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/leet08/tech/full\_papers/kreibich/kreibich.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nsdi/KreibichKLEVPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.