Year |
Citation |
Score |
2013 |
Maggi F, Frossi A, Zanero S, Stringhini G, Stone-Gross B, Kruegel C, Vigna G. Two years of short URLs internet measurement: Security threats and countermeasures Www 2013 - Proceedings of the 22nd International Conference On World Wide Web. 861-871. |
0.524 |
|
2011 |
Stone-Gross B, Stevens R, Zarras A, Kemmerer R, Kruegel C, Vigna G. Understanding fraudulent activities in online ad exchanges Proceedings of the Acm Sigcomm Internet Measurement Conference, Imc. 279-294. DOI: 10.1145/2068816.2068843 |
0.448 |
|
2011 |
Stone-Gross B, Cova M, Gilbert B, Kemmerer R, Kruegel C, Vigna G. Analysis of a botnet takeover Ieee Security and Privacy. 9: 64-72. DOI: 10.1109/MSP.2010.144 |
0.537 |
|
2011 |
Stone-Gross B, Cova M, Kruegel C, Vigna G. Peering through the iframe Proceedings - Ieee Infocom. 411-415. DOI: 10.1109/INFCOM.2011.5935193 |
0.572 |
|
2009 |
Stone-Gross B, Cova M, Cavallaro L, Gilbert B, Szydlowski M, Kemmerer R, Kruegel C, Vigna G. Your botnet is my botnet: Analysis of a botnet takeover Proceedings of the Acm Conference On Computer and Communications Security. 635-647. DOI: 10.1145/1653662.1653738 |
0.437 |
|
2009 |
Stone-Gross B, Kruegel C, Almeroth K, Moser A, Kirda E. FIRE: FInding Rogue nEtworks Proceedings - Annual Computer Security Applications Conference, Acsac. 231-240. DOI: 10.1109/ACSAC.2009.29 |
0.547 |
|
2008 |
Stone-Gross B, Sigal D, Cohn R, Morse J, Almeroth K, Kruegel C. VeriKey: A dynamic certificate verification system for public key exchanges Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5137: 44-63. DOI: 10.1007/978-3-540-70542-0_3 |
0.574 |
|
2007 |
Wittie MP, Stone-Gross B, Almeroth KC, Belding EM. MIST: Cellular data network measurement for mobile applications Proceedings of the 4th International Conference On Broadband Communications, Networks, Systems, Broadnets. 743-751. DOI: 10.1109/BROADNETS.2007.4550508 |
0.314 |
|
Show low-probability matches. |