All your iframes point to us N Provos, P Mavrommatis, M Rajab, F Monrose | 692 | 2008 |
The Ghost in the Browser: Analysis of Web-based Malware. N Provos, D McNamee, P Mavrommatis, K Wang, N Modadugu HotBots 7, 4-4, 2007 | 689 | 2007 |
Manufacturing compromise: the emergence of exploit-as-a-service C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ... Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 300 | 2012 |
Intrusive software management N Provos, Y Zhou, CW Bavor, EL Davis, M Palatucci, KP Nigam, ... US Patent App. 12/041,309, 2009 | 299 | 2009 |
Identifying known and unknown peer-to-peer traffic F Constantinou, P Mavrommatis Fifth IEEE International Symposium on Network Computing and Applications …, 2006 | 240 | 2006 |
Cybercrime 2.0: when the cloud turns dark N Provos, MA Rajab, P Mavrommatis Communications of the ACM 52 (4), 42-47, 2009 | 130 | 2009 |
Trends and lessons from three years fighting malicious extensions N Jagpal, E Dingle, JP Gravel, P Mavrommatis, N Provos, MA Rajab, ... 24th USENIX Security Symposium (USENIX Security 15), 579-593, 2015 | 114 | 2015 |
Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware. M Polychronakis, N Provos LEET 8, 1-8, 2008 | 112 | 2008 |
Detecting an intrusive landing page N Provos, Y Zhou, CW Bavor, EL Davis, M Palatucci, KP Nigam, ... US Patent 8,019,700, 2011 | 104* | 2011 |
CAMP: Content-Agnostic Malware Protection. MA Rajab, L Ballard, N Lutz, P Mavrommatis, N Provos NDSS, 2013 | 98 | 2013 |
The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution. MA Rajab, L Ballard, P Mavrommatis, N Provos, X Zhao LEET, 2010 | 94 | 2010 |
Investigating Commercial {Pay-Per-Install} and the Distribution of Unwanted Software K Thomas, JAE Crespo, R Rasti, JM Picod, C Phillips, MA Decoste, ... 25th USENIX Security Symposium (USENIX Security 16), 721-739, 2016 | 91 | 2016 |
Trends in circumventing web-malware detection M Rajab, L Ballard, N Jagpal, P Mavrommatis, D Nojiri, N Provos, ... Google, Google Technical Report 168, 2011 | 87 | 2011 |
All your iframes point to us NPP Mavrommatis, M Monrose USENIX security symposium, 1-16, 2008 | 80 | 2008 |
Protecting users from undesirable content MG Morrissey, R Cannings, JB Gruver, A Ghosh, JB Larimer, AD Stadler, ... US Patent App. 13/633,093, 2014 | 76 | 2014 |
Email-based worm propagation properties P Gopalan, K Jamieson, P Mavrommatis US Patent App. 11/387,087, 2007 | 42 | 2007 |
Automated implementation of complex distributed algorithms specified in the IOA language C Georgiou, N Lynch, P Mavrommatis, JA Tauber International Journal on Software Tools for Technology Transfer 11, 153-171, 2009 | 35 | 2009 |
Exploit-based worm propagation mitigation P Gopalan, K Jamieson, P Mavrommatis US Patent 8,006,306, 2011 | 29 | 2011 |
Intrusive software management Y Zhou, N Provos, CW Bavor, EL Davis Jr, M Palatucci, KP Nigam, ... US Patent 8,515,896, 2013 | 18 | 2013 |
Detecting pirated applications A Bhatia, MG Kang, MI Sharif, N Provos, P Mavrommatis, S Bandhakavi US Patent 8,875,303, 2014 | 17 | 2014 |