Botnet detection techniques: review, future trends, and issues
In recent years, the Internet has enabled access to widespread remote services in the
distributed computing environment; however, integrity of data transmission in the distributed …
distributed computing environment; however, integrity of data transmission in the distributed …
Botnet detection based on anomaly and community detection
J Wang, IC Paschalidis - IEEE Transactions on Control of …, 2016 - ieeexplore.ieee.org
We introduce a novel two-stage approach for the important cybersecurity problem of
detecting the presence of a botnet and identifying the compromised nodes (the bots), ideally …
detecting the presence of a botnet and identifying the compromised nodes (the bots), ideally …
The good, the bad and the bait: Detecting and characterizing clickbait on youtube
The use of deceptive techniques in user-generated video portals is ubiquitous.
Unscrupulous uploaders deliberately mislabel video descriptors aiming at increasing their …
Unscrupulous uploaders deliberately mislabel video descriptors aiming at increasing their …
That ain't you: Blocking spearphishing through behavioral modelling
G Stringhini, O Thonnard - … Conference on Detection of Intrusions and …, 2015 - Springer
One of the ways in which attackers steal sensitive information from corporations is by
sending spearphishing emails. A typical spearphishing email appears to be sent by one of …
sending spearphishing emails. A typical spearphishing email appears to be sent by one of …
Spam and criminal activity
M Alazab, R Broadhurst - Trends and issues in crime and …, 2016 - search.informit.org
The rapid growth of the internet is transforming how we engage and communicate. It also
creates new opportunities for fraud and data theft. One way cybercriminals exploit the …
creates new opportunities for fraud and data theft. One way cybercriminals exploit the …
A comprehensive study of email spam botnet detection
The problem of email spam has grown significantly over the past few years. It is not just a
nuisance for users but also it is damaging for those who fall for scams and other attacks. This …
nuisance for users but also it is damaging for those who fall for scams and other attacks. This …
Quit playing games with my heart: Understanding online dating scams
JM Huang, G Stringhini, P Yong - … , DIMVA 2015, Milan, Italy, July 9-10 …, 2015 - Springer
Online dating sites are experiencing a rise in popularity, with one in five relationships in the
United States starting on one of these sites. Online dating sites provide a valuable platform …
United States starting on one of these sites. Online dating sites provide a valuable platform …
Malicious spam emails developments and authorship attribution
M Alazab, R Layton, R Broadhurst… - 2013 fourth cybercrime …, 2013 - ieeexplore.ieee.org
The Internet is a decentralized structure that offers speedy communication, has a global
reach and provides anonymity, a characteristic invaluable for committing illegal activities. In …
reach and provides anonymity, a characteristic invaluable for committing illegal activities. In …
Understanding the detection of view fraud in video content portals
While substantial effort has been devoted to understand fraudulent activity in traditional
online advertising (search and banner), more recent forms such as video ads have received …
online advertising (search and banner), more recent forms such as video ads have received …