Privacy and security in online social networks: A survey
Online social networks (OSN) are a permanent presence in today's personal and
professional lives of a huge segment of the population, with direct consequences to offline …
professional lives of a huge segment of the population, with direct consequences to offline …
[LIBRO][B] Computer security: principles and practice
W Stallings, L Brown - 2015 - thuvienso.hoasen.edu.vn
" It also provides a solid, up-to-date reference or self-study tutorial for system engineers,
programmers, system managers, network managers, product marketing personnel, system …
programmers, system managers, network managers, product marketing personnel, system …
Suspended accounts in retrospect: an analysis of twitter spam
In this study, we examine the abuse of online social networks at the hands of spammers
through the lens of the tools, techniques, and support infrastructure they rely upon. To …
through the lens of the tools, techniques, and support infrastructure they rely upon. To …
Detecting and characterizing social spam campaigns
Online social networks (OSNs) are popular collaboration and communication tools for
millions of users and their friends. Unfortunately, in the wrong hands, they are also effective …
millions of users and their friends. Unfortunately, in the wrong hands, they are also effective …
A comprehensive study of email spam botnet detection
The problem of email spam has grown significantly over the past few years. It is not just a
nuisance for users but also it is damaging for those who fall for scams and other attacks. This …
nuisance for users but also it is damaging for those who fall for scams and other attacks. This …
Measuring {Pay-per-Install}: The commoditization of malware distribution
Recent years have seen extensive diversification of the “underground economy” associated
with malware and the subversion of Internet-connected systems. This trend towards …
with malware and the subversion of Internet-connected systems. This trend towards …
Click trajectories: End-to-end analysis of the spam value chain
Spam-based advertising is a business. While it has engendered both widespread antipathy
and a multi-billion dollar anti-spam industry, it continues to exist because it fuels a profitable …
and a multi-billion dollar anti-spam industry, it continues to exist because it fuels a profitable …
Manufacturing compromise: the emergence of exploit-as-a-service
We investigate the emergence of the exploit-as-a-service model for driveby browser
compromise. In this regime, attackers pay for an exploit kit or service to do the" dirty work" of …
compromise. In this regime, attackers pay for an exploit kit or service to do the" dirty work" of …
PREDATOR: proactive recognition and elimination of domain abuse at time-of-registration
Miscreants register thousands of new domains every day to launch Internet-scale attacks,
such as spam, phishing, and drive-by downloads. Quickly and accurately determining a …
such as spam, phishing, and drive-by downloads. Quickly and accurately determining a …
[PDF][PDF] On the Potential of Proactive Domain Blacklisting.
In this paper we explore the potential of leveraging properties inherent to domain
registrations and their appearance in DNS zone files to predict the malicious use of domains …
registrations and their appearance in DNS zone files to predict the malicious use of domains …