default search action
Gary Warner
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c24]Fei Zhao, Jiawen Chen, Bin Huang, Chengcui Zhang, Gary Warner, Rushi Chen, Shaorou Tang, Yuanfei Ma, Zixi Nan:
GenCheck: A LoRA-Adapted Multimodal Large Language Model for Check Analysis. MIPR 2024: 88-94
2010 – 2019
- 2019
- [j8]Ali Gezer, Gary Warner, Clifford Wilson, Prakash Shrestha:
A flow-based approach for Trickbot banking trojan detection. Comput. Secur. 84: 179-192 (2019) - [j7]Ali Gezer, Gary Warner:
Exploitation of ICMP time exceeded packets for a large-scale router delay analysis. Int. Arab J. Inf. Technol. 16(6): 1090-1097 (2019) - 2018
- [c23]Adam Oest, Yeganeh Safaei, Adam Doupé, Gail-Joon Ahn, Brad Wardman, Gary Warner:
Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis. eCrime 2018: 1-12 - 2017
- [c22]Arsh Arora, Thomas Stallings, Ragib Hasan, Gary Warner:
Malware Secrets: De-Obfuscating in the Cloud. CLOUD 2017: 753-756 - 2016
- [c21]Pradip Chitrakar, Chengcui Zhang, Gary Warner, Xinpeng L. Liao:
Social Media Image Retrieval Using Distilled Convolutional Neural Network for Suspicious e-Crime and Terrorist Account Detection. ISM 2016: 493-498 - 2015
- [j6]Xinpeng L. Liao, Pradip Chitrakar, Chengcui Zhang, Gary Warner:
Object-of-Interest Retrieval in Social Media Image Databases for e-Crime Forum Detection. Int. J. Multim. Data Eng. Manag. 6(3): 32-50 (2015) - [c20]Gary Warner, Dhiraj Rajani, Mike Nagy:
Spammer success through customization and randomization of URLs. eCrime 2015: 53-58 - 2014
- [j5]Brad Wardman, Jason Britt, Gary Warner:
New tackle to catch a phisher. Int. J. Electron. Secur. Digit. Forensics 6(1): 62-80 (2014) - [c19]Shams Zawoad, Ragib Hasan, Md Munirul Haque, Gary Warner:
CURLA: Cloud-Based Spam URL Analyzer for Very Large Datasets. IEEE CLOUD 2014: 729-736 - [c18]Shams Zawoad, Ragib Hasan, Gary Warner, Anthony Skjellum:
UDaaS: A Cloud-Based URL-Deduplication-as-a-Service for Big Datasets. BDCloud 2014: 271-272 - [c17]Prasha Shrestha, Suraj Maharjan, Gabriela Ramírez-de-la-Rosa, Alan P. Sprague, Thamar Solorio, Gary Warner:
Using String Information for Malware Family Identification. IBERAMIA 2014: 686-697 - 2013
- [c16]Shams Zawoad, Amit Kumar Dutta, Alan P. Sprague, Ragib Hasan, Jason Britt, Gary Warner:
Phish-Net: Investigating phish clusters using drop email addresses. eCrime 2013: 1-13 - [c15]Alan P. Sprague, Adam Rhodes, Gary Warner:
Using closed frequent sets to cluster malwares. ICAT 2013: 1-4 - 2012
- [j4]Lin Yang, Wei-bang Chen, Chengcui Zhang, John K. Johnstone, Song Gao, Gary Warner:
Profiling Online Auction Sellers Using Image-Editing Styles. IEEE Multim. 19(1): 29 (2012) - [c14]Rachel Levin, Jonathan Richardson, Gary Warner, Kent Kerley:
Explaining Cybercrime through the Lens of Differential Association Theory, Hadidi44-2.php PayPal Case Study. eCrime Researchers Summit 2012: 1-7 - [c13]Jason Britt, Brad Wardman, Alan P. Sprague, Gary Warner:
Clustering Potential Phishing Websites Using DeepMD5. LEET 2012 - 2011
- [c12]Binod Gyawali, Thamar Solorio, Manuel Montes-y-Gómez, Brad Wardman, Gary Warner:
Evaluating a semisupervised approach to phishing url identification in a realistic scenario. CEAS 2011: 176-183 - [c11]Philip J. Nero, Brad Wardman, Heith Copes, Gary Warner:
Phishing: Crime that pays. eCrime Researchers Summit 2011: 1-10 - [c10]Brad Wardman, Tommy Stallings, Gary Warner, Anthony Skjellum:
High-performance content-based phishing attack detection. eCrime Researchers Summit 2011: 1-9 - [c9]Heather McCalley, Brad Wardman, Gary Warner:
Analysis of Back-Doored Phishing Kits. IFIP Int. Conf. Digital Forensics 2011: 155-168 - 2010
- [j3]Chun Wei, Alan P. Sprague, Gary Warner, Anthony Skjellum:
Clustering Spam Domains and Destination Websites: Digital Forensics with Data Mining. J. Digit. Forensics Secur. Law 5(1): 21-48 (2010) - [c8]Aaron Blum, Brad Wardman, Thamar Solorio, Gary Warner:
Lexical feature based phishing URL detection using online learning. AISec 2010: 54-60 - [c7]Brian K. Tanner, Gary Warner, Henry Stern, Scott Olechowski:
Koobface: The evolution of the social botnet. eCrime 2010: 1-10
2000 – 2009
- 2009
- [j2]Chengcui Zhang, Xin Chen, Wei-bang Chen, Lin Yang, Gary Warner:
Spam Image Clustering for Identifying Common Sources of Unsolicited Emails. Int. J. Digit. Crime Forensics 1(3): 1-20 (2009) - [j1]Chengcui Zhang, Wei-bang Chen, Xin Chen, Richa Tiwari, Lin Yang, Gary Warner:
A Multimodal Data Mining Framework for Revealing Common Sources of Spam Images. J. Multim. 4(5): 313-320 (2009) - [c6]Brad Wardman, Gaurang Shukla, Gary Warner:
Identifying vulnerable websites by analysis of common strings in phishing URLs. eCrime 2009: 1-13 - [c5]Chun Wei, Alan P. Sprague, Gary Warner:
Clustering malware-generated spam emails with a novel fuzzy string matching algorithm. SAC 2009: 889-890 - [c4]Chengcui Zhang, Wei-bang Chen, Xin Chen, Gary Warner:
Revealing common sources of image spam by unsupervised clustering with visual features. SAC 2009: 891-892 - 2008
- [c3]Chun Wei, Alan P. Sprague, Gary Warner:
Detection of networks blocks used by the Storm Worm botnet. ACM Southeast Regional Conference 2008: 356-360 - [c2]Brad Wardman, Gary Warner:
Automating phishing website identification through deep MD5 matching. eCrime 2008: 1-7 - [c1]Chun Wei, Alan P. Sprague, Gary Warner, Anthony Skjellum:
Mining spam email to identify common origins for forensic application. SAC 2008: 1433-1437
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-05 21:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint