Seguir
Kirill Levchenko
Kirill Levchenko
Dirección de correo verificada de illinois.edu - Página principal
Título
Citado por
Citado por
Año
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names
S Meiklejohn, M Pomarole, G Jordan, K Levchenko, D McCoy, ...
ACM Internet Measurement Conference, 127-140, 2013
19472013
Spamalytics: An Empirical Analysis of Spam Marketing Conversion
C Kanich, C Kreibich, K Levchenko, B Enright, GM Voelker, V Paxson, ...
ACM Conference on Computer and Communications Security, 3-14, 2008
6002008
An Analysis of Underground Forums
M Motoyama, D McCoy, K Levchenko, S Savage, GM Voelker
ACM Internet Measurement Conference, 71-80, 2011
4182011
Click Trajectories: End-to-End Analysis of the Spam Value Chain
K Levchenko, A Pitsillidis, N Chachra, B Enright, M Félegyházi, C Grier, ...
IEEE Symposium on Security and Privacy, 431-446, 2011
3812011
Unexpected Means of Protocol Inference
J Ma, K Levchenko, C Kreibich, S Savage, GM Voelker
ACM Internet Measurement Conference, 313-326, 2006
3182006
Re: CAPTCHAs – Understanding CAPTCHA-Solving Services in an Economic Context
M Motoyama, K Levchenko, C Kanich, D McCoy, GM Voelker, S Savage
USENIX Security Symposium, 2010
3132010
Manufacturing Compromise: The Emergence of Exploit-as-a-Service
C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ...
ACM Conference on Computer and Communications Security, 821-832, 2012
3122012
Tracking Ransomware End-to-End
DY Huang, MM Aliapoulios, VG Li, L Invernizzi, E Bursztein, K McRoberts, ...
IEEE Symposium on Security and Privacy, 618-631, 2018
2932018
California Fault Lines: Understanding the Causes and Impact of Network Failures
D Turner, K Levchenko, AC Snoeren, S Savage
ACM SIGCOMM, 315-326, 2010
2572010
Pharmaleaks: Understanding the Business of Online Pharmaceutical Affiliate Programs
D McCoy, A Pitsillidis, J Grant, N Weaver, C Kreibich, B Krebs, G Voelker, ...
USENIX Security Symposium, 2012
1812012
Show Me the Money: Characterizing Spam-advertised Revenue
C Kanich, N Weaver, D McCoy, T Halvorson, C Kreibich, K Levchenko, ...
USENIX Security Symposium, 2011
1692011
Reading the Tea Leaves: A Comparative Analysis of Threat Intelligence
VG Li, M Dunn, P Pearce, D McCoy, GM Voelker, S Savage, K Levchenko
USENIX Security, 2019
1602019
Spamcraft: An Inside Look At Spam Campaign Orchestration
C Kreibich, C Kanich, K Levchenko, B Enright, GM Voelker, V Paxson, ...
USENIX LEET Workshop, 2009
1382009
Botcoin: Monetizing stolen cycles.
DY Huang, H Dharmdasani, S Meiklejohn, V Dave, C Grier, D McCoy, ...
NDSS 2014, 1-16, 2014
1362014
Dirty jobs: The role of freelance labor in web service abuse
M Motoyama, D McCoy, K Levchenko, S Savage, GM Voelker
20th USENIX Security Symposium (USENIX Security 11), 2011
1332011
Botnet Judo: Fighting Spam with Itself
A Pitsillidis, K Levchenko, C Kreibich, C Kanich, GM Voelker, V Paxson, ...
Network & Distributed System Security Symposium, 2010
1292010
Security by any other name: On the effectiveness of provider based email security
ID Foster, J Larson, M Masich, AC Snoeren, S Savage, K Levchenko
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
1282015
Every microsecond counts: tracking fine-grain latencies with a lossy difference aggregator
RR Kompella, K Levchenko, AC Snoeren, G Varghese
ACM SIGCOMM Computer Communication Review 39 (4), 255-266, 2009
1252009
On the Spam Campaign Trail
C Kreibich, C Kanich, K Levchenko, B Enright, GM Voelker, V Paxson, ...
USENIX LEET Workshop, 2008
1232008
Compressing network graphs
AC Gilbert, K Levchenko
Proceedings of the LinkKDD workshop at the 10th ACM Conference on KDD 124, 2004
1212004
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20