Spamalytics: An empirical analysis of spam marketing conversion C Kanich, C Kreibich, K Levchenko, B Enright, GM Voelker, V Paxson, ... Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 582 | 2008 |
Click trajectories: End-to-end analysis of the spam value chain K Levchenko, A Pitsillidis, N Chachra, B Enright, M Félegyházi, C Grier, ... 2011 ieee symposium on security and privacy, 431-446, 2011 | 363 | 2011 |
Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context. M Motoyama, K Levchenko, C Kanich, D McCoy, GM Voelker, S Savage USENIX Security Symposium 10, 3, 2010 | 281 | 2010 |
The long “taile” of typosquatting domain names J Szurdi, B Kocso, G Cseh, J Spring, M Felegyhazi, C Kanich 23rd {USENIX} Security Symposium ({USENIX} Security 14), 191-206, 2014 | 187 | 2014 |
Show Me the Money: Characterizing Spam-advertised Revenue. C Kanich, N Weaver, D McCoy, T Halvorson, C Kreibich, K Levchenko, ... USENIX Security Symposium 35, 2011 | 163 | 2011 |
Spamcraft: An Inside Look At Spam Campaign Orchestration. C Kreibich, C Kanich, K Levchenko, B Enright, GM Voelker, V Paxson, ... LEET, 2009 | 132 | 2009 |
Botnet Judo: Fighting Spam with Itself. A Pitsillidis, K Levchenko, C Kreibich, C Kanich, GM Voelker, V Paxson, ... NDSS, 2010 | 124 | 2010 |
On the spam campaign trail. C Kreibich, C Kanich, K Levchenko, B Enright, GM Voelker, V Paxson, ... LEET 8 (2008), 1-9, 2008 | 123 | 2008 |
The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff. C Kanich, K Levchenko, B Enright, GM Voelker, S Savage LEET 8, 1-9, 2008 | 99 | 2008 |
Gq: Practical containment for measuring modern malware systems C Kreibich, N Weaver, C Kanich, W Cui, V Paxson Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011 | 90 | 2011 |
Fifteen minutes of unwanted fame: Detecting and characterizing doxing P Snyder, P Doerfler, C Kanich, D McCoy proceedings of the 2017 Internet Measurement Conference, 432-444, 2017 | 78 | 2017 |
Every second counts: Quantifying the negative externalities of cybercrime via typosquatting MT Khan, X Huo, Z Li, C Kanich 2015 IEEE Symposium on Security and Privacy, 135-150, 2015 | 75 | 2015 |
An empirical analysis of the commercial vpn ecosystem MT Khan, J DeBlasio, GM Voelker, AC Snoeren, C Kanich, ... Proceedings of the Internet Measurement Conference 2018, 443-456, 2018 | 74 | 2018 |
Most websites don't need to vibrate: A cost-benefit approach to improving browser security P Snyder, C Taylor, C Kanich Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 69 | 2017 |
O Single Sign-Off, Where Art Thou? An Empirical Analysis of Single Sign-On Account Hijacking and Session Management on the Web. M Ghasemisharif, A Ramesh, S Checkoway, C Kanich, J Polakis USENIX Security Symposium, 1475-1492, 2018 | 57 | 2018 |
Leveraging machine learning to improve unwanted resource filtering S Bhagavatula, C Dunn, C Kanich, M Gupta, B Ziebart Proceedings of the 2014 Workshop on Artificial Intelligent and Security …, 2014 | 56 | 2014 |
Taster's choice: a comparative analysis of spam feeds A Pitsillidis, C Kanich, GM Voelker, K Levchenko, S Savage Proceedings of the 2012 Internet Measurement Conference, 427-440, 2012 | 55 | 2012 |
Browser feature usage on the modern web P Snyder, L Ansari, C Taylor, C Kanich Proceedings of the 2016 Internet Measurement Conference, 97-110, 2016 | 54 | 2016 |
Leveraging semantic transformation to investigate password habits and their causes A Hanamsagar, SS Woo, C Kanich, J Mirkovic Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems …, 2018 | 45 | 2018 |
Deepauth: A framework for continuous user re-authentication in mobile apps S Amini, V Noroozi, A Pande, S Gupte, PS Yu, C Kanich Proceedings of the 27th ACM International Conference on Information and …, 2018 | 40 | 2018 |