Privacy and security in online social networks: A survey

I Kayes, A Iamnitchi - Online Social Networks and Media, 2017 - Elsevier
Online social networks (OSN) are a permanent presence in today's personal and
professional lives of a huge segment of the population, with direct consequences to offline …

[LIBRO][B] Computer security: principles and practice

W Stallings, L Brown - 2015 - thuvienso.hoasen.edu.vn
" It also provides a solid, up-to-date reference or self-study tutorial for system engineers,
programmers, system managers, network managers, product marketing personnel, system …

Suspended accounts in retrospect: an analysis of twitter spam

K Thomas, C Grier, D Song, V Paxson - Proceedings of the 2011 ACM …, 2011 - dl.acm.org
In this study, we examine the abuse of online social networks at the hands of spammers
through the lens of the tools, techniques, and support infrastructure they rely upon. To …

Detecting and characterizing social spam campaigns

H Gao, J Hu, C Wilson, Z Li, Y Chen… - Proceedings of the 10th …, 2010 - dl.acm.org
Online social networks (OSNs) are popular collaboration and communication tools for
millions of users and their friends. Unfortunately, in the wrong hands, they are also effective …

A comprehensive study of email spam botnet detection

WZ Khan, MK Khan, FTB Muhaya… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
The problem of email spam has grown significantly over the past few years. It is not just a
nuisance for users but also it is damaging for those who fall for scams and other attacks. This …

Measuring {Pay-per-Install}: The commoditization of malware distribution

J Caballero, C Grier, C Kreibich, V Paxson - 20th USENIX Security …, 2011 - usenix.org
Recent years have seen extensive diversification of the “underground economy” associated
with malware and the subversion of Internet-connected systems. This trend towards …

Click trajectories: End-to-end analysis of the spam value chain

K Levchenko, A Pitsillidis, N Chachra… - … ieee symposium on …, 2011 - ieeexplore.ieee.org
Spam-based advertising is a business. While it has engendered both widespread antipathy
and a multi-billion dollar anti-spam industry, it continues to exist because it fuels a profitable …

Manufacturing compromise: the emergence of exploit-as-a-service

C Grier, L Ballard, J Caballero, N Chachra… - Proceedings of the …, 2012 - dl.acm.org
We investigate the emergence of the exploit-as-a-service model for driveby browser
compromise. In this regime, attackers pay for an exploit kit or service to do the" dirty work" of …

PREDATOR: proactive recognition and elimination of domain abuse at time-of-registration

S Hao, A Kantchelian, B Miller, V Paxson… - Proceedings of the 2016 …, 2016 - dl.acm.org
Miscreants register thousands of new domains every day to launch Internet-scale attacks,
such as spam, phishing, and drive-by downloads. Quickly and accurately determining a …

[PDF][PDF] On the Potential of Proactive Domain Blacklisting.

M Felegyhazi, C Kreibich, V Paxson - LEET, 2010 - usenix.org
In this paper we explore the potential of leveraging properties inherent to domain
registrations and their appearance in DNS zone files to predict the malicious use of domains …