Opening the blackbox of virustotal: Analyzing online phishing scan engines

P Peng, L Yang, L Song, G Wang - Proceedings of the Internet …, 2019 - dl.acm.org
Online scan engines such as VirusTotal are heavily used by researchers to label malicious
URLs and files. Unfortunately, it is not well understood how the labels are generated and …

Practical attacks against graph-based clustering

Y Chen, Y Nadji, A Kountouras, F Monrose… - Proceedings of the …, 2017 - dl.acm.org
Graph modeling allows numerous security problems to be tackled in a general way,
however, little work has been done to understand their ability to withstand adversarial …

Detecting and understanding online advertising fraud in the wild

F Kanei, D Chiba, K Hato, K Yoshioka… - … on Information and …, 2020 - search.ieice.org
While the online advertisement is widely used on the web and on mobile applications, the
monetary damages by advertising frauds (ad frauds) have become a severe problem …

Precise and robust detection of advertising fraud

F Kanei, D Chiba, K Hato… - 2019 IEEE 43rd Annual …, 2019 - ieeexplore.ieee.org
As the online advertising market has grown, advertising frauds (ad frauds) have become a
serious problem. Countermeasures against ad frauds are evaded since they rely on …

[PDF][PDF] The Digital Advertising Ecosystem Visualization–Literature Review

V Stallone, M Klaas - Held on the 12th IADIS International …, 2019 - researchgate.net
In this reflection paper we suggest the need for a standardization of digital advertising
ecosystem conceptual flow visualizations. We do so, because of the diversity of available …

The digital advertising conceptual flow: a literature review

V Stallone - Marketing and Smart Technologies: Proceedings of …, 2020 - Springer
This paper presents a systematic review of the literature of 22 research articles, which used
a visualization of the digital advertising conceptual flow with a focus on programmatic …

Analyzing and Mitigating Potential Risks of Third-party Resource Inclusions

S Indela - 2021 - search.proquest.com
In today's computer services, developers commonly use third-party resources like libraries,
hosting infrastructure and advertisements. Using third-party components improves the …

[PDF][PDF] Exposing and Mitigating Cross-Channel Abuse that Exploits the Converged Communications Infrastructure

BR Srinivasan - 2017 - core.ac.uk
Over the years there has been a vigorous effort and commendable success in consolidating
traditional and emerging communications infrastrucuture, leading to a significant evolution in …

[PDF][PDF] DO NOT HATE THE PLAYERS THE DIGITAL ADVERTISING ECOSYSTEM AND ITS ACTORS

V Stallone - 18th International Conference on WWW/Internet 2019 …, 2019 - researchgate.net
This paper presents a systematic review of the literature of 29 research articles, which used
a visualization of the digital advertising ecosystem with a focus on online real-time …

Quantifying and Predicting User Reputation in a Network Security Context

MS Gratian - 2019 - search.proquest.com
Reputation has long been an important factor for establishing trust and evaluating the
character of others. Though subjective by definition, it recently emerged in the field of …