Spamalytics: An empirical analysis of spam marketing conversion C Kanich, C Kreibich, K Levchenko, B Enright, GM Voelker, V Paxson, ... Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 598 | 2008 |
Click trajectories: End-to-end analysis of the spam value chain K Levchenko, A Pitsillidis, N Chachra, B Enright, M Félegyházi, C Grier, ... 2011 ieee symposium on security and privacy, 431-446, 2011 | 379 | 2011 |
Re:{CAPTCHAs—Understanding}{CAPTCHA-Solving} Services in an Economic Context M Motoyama, K Levchenko, C Kanich, D McCoy, GM Voelker, S Savage 19th USENIX Security Symposium (USENIX Security 10), 2010 | 312 | 2010 |
The long {“Taile”} of typosquatting domain names J Szurdi, B Kocso, G Cseh, J Spring, M Felegyhazi, C Kanich 23rd USENIX Security Symposium (USENIX Security 14), 191-206, 2014 | 225 | 2014 |
Show me the money: Characterizing spam-advertised revenue C Kanich, N Weaver, D McCoy, T Halvorson, C Kreibich, K Levchenko, ... 20th USENIX Security Symposium (USENIX Security 11), 2011 | 167 | 2011 |
Spamcraft: An Inside Look At Spam Campaign Orchestration. C Kreibich, C Kanich, K Levchenko, B Enright, GM Voelker, V Paxson, ... LEET, 2009 | 138 | 2009 |
An empirical analysis of the commercial vpn ecosystem MT Khan, J DeBlasio, GM Voelker, AC Snoeren, C Kanich, ... Proceedings of the Internet Measurement Conference 2018, 443-456, 2018 | 129 | 2018 |
Botnet Judo: Fighting Spam with Itself. A Pitsillidis, K Levchenko, C Kreibich, C Kanich, GM Voelker, V Paxson, ... NDSS, 2010 | 129 | 2010 |
On the spam campaign trail. C Kreibich, C Kanich, K Levchenko, B Enright, GM Voelker, V Paxson, ... LEET 8 (2008), 1-9, 2008 | 121 | 2008 |
Fifteen minutes of unwanted fame: Detecting and characterizing doxing P Snyder, P Doerfler, C Kanich, D McCoy Proceedings of the 2017 internet measurement conference, 432-444, 2017 | 104 | 2017 |
The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff. C Kanich, K Levchenko, B Enright, GM Voelker, S Savage LEET 8, 1-9, 2008 | 100 | 2008 |
Gq: Practical containment for measuring modern malware systems C Kreibich, N Weaver, C Kanich, W Cui, V Paxson Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011 | 92 | 2011 |
O single {Sign-Off}, where art thou? An empirical analysis of single {Sign-On} account hijacking and session management on the web M Ghasemisharif, A Ramesh, S Checkoway, C Kanich, J Polakis 27th USENIX Security Symposium (USENIX Security 18), 1475-1492, 2018 | 89 | 2018 |
Every second counts: Quantifying the negative externalities of cybercrime via typosquatting MT Khan, X Huo, Z Li, C Kanich 2015 IEEE Symposium on Security and Privacy, 135-150, 2015 | 87 | 2015 |
Most websites don't need to vibrate: A cost-benefit approach to improving browser security P Snyder, C Taylor, C Kanich Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 86 | 2017 |
Deepauth: A framework for continuous user re-authentication in mobile apps S Amini, V Noroozi, A Pande, S Gupte, PS Yu, C Kanich Proceedings of the 27th ACM International Conference on Information and …, 2018 | 66 | 2018 |
Leveraging semantic transformation to investigate password habits and their causes A Hanamsagar, SS Woo, C Kanich, J Mirkovic Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems …, 2018 | 65 | 2018 |
Browser feature usage on the modern web P Snyder, L Ansari, C Taylor, C Kanich Proceedings of the 2016 Internet Measurement Conference, 97-110, 2016 | 65 | 2016 |
Taster's choice: a comparative analysis of spam feeds A Pitsillidis, C Kanich, GM Voelker, K Levchenko, S Savage Proceedings of the 2012 Internet Measurement Conference, 427-440, 2012 | 65 | 2012 |
Leveraging machine learning to improve unwanted resource filtering S Bhagavatula, C Dunn, C Kanich, M Gupta, B Ziebart Proceedings of the 2014 Workshop on Artificial Intelligent and Security …, 2014 | 62 | 2014 |