Year |
Citation |
Score |
2016 |
Meiklejohn S, Pomarole M, Jordan G, Levchenko K, McCoy D, Voelker GM, Savage S. A fistful of Bitcoins: characterizing payments among men with no names Communications of the Acm. 59: 86-93. DOI: 10.1145/2896384 |
0.701 |
|
2013 |
Meiklejohn S, Pomarole M, Jordan G, Levchenko K, McCoy D, Voelker GM, Savage S. A fistful of bitcoins: Characterizing payments among men with no names Proceedings of the Acm Sigcomm Internet Measurement Conference, Imc. 127-139. DOI: 10.1145/2504730.2504747 |
0.613 |
|
2012 |
Pitsillidis A, Kanich C, Voelker GM, Levchenko K, Savage S. Taster's choice: A comparative analysis of spam feeds Proceedings of the Acm Sigcomm Internet Measurement Conference, Imc. 427-440. DOI: 10.1145/2398776.2398821 |
0.639 |
|
2012 |
Grier C, Ballard L, Caballero J, Chachra N, Dietrich CJ, Levchenko K, Mavrommatis P, McCoy D, Nappa A, Pitsillidis A, Provos N, Rafique MZ, Rajab MA, Rossow C, Thomas K, et al. Manufacturing compromise: The emergence of exploit-as-a-service Proceedings of the Acm Conference On Computer and Communications Security. 821-832. DOI: 10.1145/2382196.2382283 |
0.639 |
|
2011 |
Levchenko K, Pitsillidis A, Chachra N, Enright B, Félegyházi M, Grier C, Halvorson T, Kanich C, Kreibich C, Liu H, McCoy D, Weaver N, Paxson V, Voelker GM, Savage S. Click trajectories: End-to-end analysis of the spam value chain Proceedings - Ieee Symposium On Security and Privacy. 431-446. DOI: 10.1109/SP.2011.24 |
0.665 |
|
2009 |
Kanich C, Kreibich C, Levchenko K, Enright B, Voelker GM, Paxson V, Savage S. Spamalytics: An empirical analysis of spam marketing conversion Communications of the Acm. 52: 99-107. DOI: 10.1145/1562164.1562190 |
0.61 |
|
Show low-probability matches. |