Kurt Thomas
Titolo
Citata da
Citata da
Anno
Understanding the mirai botnet
M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ...
26th {USENIX} security symposium ({USENIX} Security 17), 1093-1110, 2017
6622017
@ spam: the underground on 140 characters or less
C Grier, K Thomas, V Paxson, M Zhang
Proceedings of the 17th ACM conference on Computer and communicationsá…, 2010
6502010
Design and Evaluation of a Real-Time URL Spam Filtering Service
K Thomas, C Grier, J Ma, V Paxson, D Song
Proceedings of the IEEE Symposium on Security and Privacy, Los Alamitos, CA, USA, 2011
4902011
Suspended accounts in retrospect: an analysis of twitter spam
K Thomas, C Grier, D Song, V Paxson
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurementá…, 2011
4692011
Trafficking fraudulent accounts: The role of the underground market in Twitter spam and abuse
K Thomas, D McCoy, C Grier, A Kolcz, V Paxson
22nd {USENIX} Security Symposium ({USENIX} Security 13), 195-210, 2013
2582013
Manufacturing compromise: the emergence of exploit-as-a-service
C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ...
Proceedings of the 2012 ACM conference on Computer and communicationsá…, 2012
2492012
The Koobface botnet and the rise of social malware
K Thomas, DM Nicol
2010 5th International Conference on Malicious and Unwanted Software, 63-70, 2010
1542010
unfriendly: Multi-party privacy risks in social networks
K Thomas, C Grier, DM Nicol
International Symposium on Privacy Enhancing Technologies Symposium, 236-252, 2010
1362010
Ad injection at scale: Assessing deceptive advertisement modifications
K Thomas, E Bursztein, C Grier, G Ho, N Jagpal, A Kapravelos, D McCoy, ...
2015 IEEE Symposium on Security and Privacy, 151-167, 2015
972015
Framing Dependencies Introduced by Underground Commoditization
K Thomas, DY Huang, D Wang, B Elie, C Grier, TJ Holt, C Kruegel, ...
Workshop on the Economics of Information Security, 2015
942015
Adapting social spam infrastructure for political censorship
K Thomas, C Grier, V Paxson
Proceedings of 5th USENIX conf. on LEET 12, 13, 2012
862012
Neither snow nor rain nor MITM... an empirical analysis of email delivery security
Z Durumeric, D Adrian, A Mirian, J Kasten, E Bursztein, N Lidzborski, ...
Proceedings of the 2015 Internet Measurement Conference, 27-39, 2015
842015
Data breaches, phishing, or malware? Understanding the risks of stolen credentials
K Thomas, F Li, A Zand, J Barrett, J Ranieri, L Invernizzi, Y Markov, ...
Proceedings of the 2017 ACM SIGSAC conference on computer and communicationsá…, 2017
702017
Trends and Lessons from Three Years Fighting Malicious Extensions
N Jagpal, E Dingle, JP Gravel, P Mavrommatis, N Provos, MA Rajab, ...
Usenix Security, 2015
602015
Consequences of Connectivity: Characterizing Account Hijacking on Twitter
K Thomas, F Li, C Grier, V Paxson
Proceedings of the 21st Annual Conference on Computer and Communicationsá…, 2014
592014
Investigating commercial pay-per-install and the distribution of unwanted software
K Thomas, JAE Crespo, R Rasti, JM Picod, C Phillips, MA Decoste, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 721-739, 2016
502016
Remedying web hijacking: Notification effectiveness and webmaster comprehension
F Li, G Ho, E Kuan, Y Niu, L Ballard, K Thomas, E Bursztein, V Paxson
Proceedings of the 25th International Conference on World Wide Web, 1009-1019, 2016
382016
Practical Comprehensive Bounds on Surreptitious Communication Over DNS
V Paxson, M Christodorescu, MJJ Rao, R Sailer, D Schales, MP Stoecklin, ...
Proceedings of the 22nd Usenix Security Symposium, 2013
382013
Dialing Back Abuse on Phone Verified Accounts
K Thomas, D Iatskiv, E Bursztein, T Pietraszek, C Grier, D McCoy
Proceedings of the 21st Annual Conference on Computer and Communicationsá…, 2014
352014
Sybilframe: A defense-in-depth framework for structure-based sybil detection
P Gao, NZ Gong, S Kulkarni, K Thomas, P Mittal
arXiv preprint arXiv:1503.02985, 2015
332015
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20