Kirill Levchenko
Kirill Levchenko
Associate Research Scientist, UC San Diego
Email verificata su cs.ucsd.edu - Home page
TitoloCitata daAnno
A fistful of bitcoins: characterizing payments among men with no names
S Meiklejohn, M Pomarole, G Jordan, K Levchenko, D McCoy, ...
Proceedings of the 2013 conference on Internet measurement conference, 127-140, 2013
7062013
Spamalytics: An empirical analysis of spam marketing conversion
C Kanich, C Kreibich, K Levchenko, B Enright, GM Voelker, V Paxson, ...
Proceedings of the 15th ACM conference on Computer and communications …, 2008
4992008
Click trajectories: End-to-end analysis of the spam value chain
K Levchenko, A Pitsillidis, N Chachra, B Enright, M Félegyházi, C Grier, ...
2011 ieee symposium on security and privacy, 431-446, 2011
2812011
Unexpected means of protocol inference
J Ma, K Levchenko, C Kreibich, S Savage, GM Voelker
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, 313-326, 2006
2492006
An analysis of underground forums
M Motoyama, D McCoy, K Levchenko, S Savage, GM Voelker
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011
2422011
Manufacturing compromise: the emergence of exploit-as-a-service
C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
2282012
Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context.
M Motoyama, K Levchenko, C Kanich, D McCoy, GM Voelker, S Savage
USENIX Security Symposium 10, 3, 2010
2132010
California fault lines: understanding the causes and impact of network failures
D Turner, K Levchenko, AC Snoeren, S Savage
ACM SIGCOMM Computer Communication Review 41 (4), 315-326, 2011
1512011
Show Me the Money: Characterizing Spam-advertised Revenue.
C Kanich, N Weaver, D McCoy, T Halvorson, C Kreibich, K Levchenko, ...
USENIX Security Symposium, 15-15, 2011
1372011
Pharmaleaks: Understanding the business of online pharmaceutical affiliate programs
D McCoy, A Pitsillidis, J Grant, N Weaver, C Kreibich, B Krebs, G Voelker, ...
Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security …, 2012
1272012
Spamcraft: An Inside Look At Spam Campaign Orchestration.
C Kreibich, C Kanich, K Levchenko, B Enright, GM Voelker, V Paxson, ...
LEET, 2009
1152009
Botnet Judo: Fighting Spam with Itself.
A Pitsillidis, K Levchenko, C Kreibich, C Kanich, GM Voelker, V Paxson, ...
NDSS, 2010
1092010
On the Spam Campaign Trail.
C Kreibich, C Kanich, K Levchenko, B Enright, GM Voelker, V Paxson, ...
LEET 8 (2008), 1-9, 2008
1072008
Dirty jobs: The role of freelance labor in web service abuse
M Motoyama, D McCoy, K Levchenko, S Savage, GM Voelker
Proceedings of the 20th USENIX conference on Security, 14-14, 2011
1042011
Every microsecond counts: tracking fine-grain latencies with a lossy difference aggregator
RR Kompella, K Levchenko, AC Snoeren, G Varghese
ACM SIGCOMM Computer Communication Review 39 (4), 255-266, 2009
972009
The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff.
C Kanich, K Levchenko, B Enright, GM Voelker, S Savage
LEET 8, 1-9, 2008
862008
Compressing network graphs
AC Gilbert, K Levchenko
Proceedings of the LinkKDD workshop at the 10th ACM Conference on KDD 124, 2004
822004
Botcoin: Monetizing Stolen Cycles.
DY Huang, H Dharmdasani, S Meiklejohn, V Dave, C Grier, D McCoy, ...
NDSS, 2014
662014
XL: An efficient network routing algorithm
K Levchenko, GM Voelker, R Paturi, S Savage
ACM SIGCOMM Computer Communication Review 38 (4), 15-26, 2008
612008
The magazine archive includes every article published in Communications of the ACM for over the past 50 years.
PJ Denning
Communications of the ACM 56 (5), 35-38, 2013
55*2013
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20