A Fistful of Bitcoins: Characterizing Payments Among Men with No Names S Meiklejohn, M Pomarole, G Jordan, K Levchenko, D McCoy, ... ACM Internet Measurement Conference, 127-140, 2013 | 1886 | 2013 |
Spamalytics: An Empirical Analysis of Spam Marketing Conversion C Kanich, C Kreibich, K Levchenko, B Enright, GM Voelker, V Paxson, ... ACM Conference on Computer and Communications Security, 3-14, 2008 | 596 | 2008 |
An Analysis of Underground Forums M Motoyama, D McCoy, K Levchenko, S Savage, GM Voelker ACM Internet Measurement Conference, 71-80, 2011 | 405 | 2011 |
Click Trajectories: End-to-End Analysis of the Spam Value Chain K Levchenko, A Pitsillidis, N Chachra, B Enright, M Félegyházi, C Grier, ... IEEE Symposium on Security and Privacy, 431-446, 2011 | 375 | 2011 |
Unexpected Means of Protocol Inference J Ma, K Levchenko, C Kreibich, S Savage, GM Voelker ACM Internet Measurement Conference, 313-326, 2006 | 316 | 2006 |
Re: CAPTCHAs – Understanding CAPTCHA-Solving Services in an Economic Context M Motoyama, K Levchenko, C Kanich, D McCoy, GM Voelker, S Savage USENIX Security Symposium, 2010 | 310 | 2010 |
Manufacturing Compromise: The Emergence of Exploit-as-a-Service C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ... ACM Conference on Computer and Communications Security, 821-832, 2012 | 306 | 2012 |
Tracking Ransomware End-to-End DY Huang, MM Aliapoulios, VG Li, L Invernizzi, E Bursztein, K McRoberts, ... IEEE Symposium on Security and Privacy, 618-631, 2018 | 267 | 2018 |
California Fault Lines: Understanding the Causes and Impact of Network Failures D Turner, K Levchenko, AC Snoeren, S Savage ACM SIGCOMM, 315-326, 2010 | 249 | 2010 |
Pharmaleaks: Understanding the Business of Online Pharmaceutical Affiliate Programs D McCoy, A Pitsillidis, J Grant, N Weaver, C Kreibich, B Krebs, G Voelker, ... USENIX Security Symposium, 2012 | 179 | 2012 |
Show Me the Money: Characterizing Spam-advertised Revenue C Kanich, N Weaver, D McCoy, T Halvorson, C Kreibich, K Levchenko, ... USENIX Security Symposium, 2011 | 167 | 2011 |
Reading the Tea Leaves: A Comparative Analysis of Threat Intelligence VG Li, M Dunn, P Pearce, D McCoy, GM Voelker, S Savage, K Levchenko USENIX Security, 2019 | 145 | 2019 |
Spamcraft: An Inside Look At Spam Campaign Orchestration C Kreibich, C Kanich, K Levchenko, B Enright, GM Voelker, V Paxson, ... USENIX LEET Workshop, 2009 | 137 | 2009 |
Botcoin: Monetizing stolen cycles. DY Huang, H Dharmdasani, S Meiklejohn, V Dave, C Grier, D McCoy, ... NDSS 2014, 1-16, 2014 | 133 | 2014 |
Dirty jobs: The role of freelance labor in web service abuse M Motoyama, D McCoy, K Levchenko, S Savage, GM Voelker 20th USENIX Security Symposium (USENIX Security 11), 2011 | 133 | 2011 |
Botnet Judo: Fighting Spam with Itself A Pitsillidis, K Levchenko, C Kreibich, C Kanich, GM Voelker, V Paxson, ... Network & Distributed System Security Symposium, 2010 | 129 | 2010 |
Every microsecond counts: tracking fine-grain latencies with a lossy difference aggregator RR Kompella, K Levchenko, AC Snoeren, G Varghese ACM SIGCOMM Computer Communication Review 39 (4), 255-266, 2009 | 125 | 2009 |
Security by any other name: On the effectiveness of provider based email security ID Foster, J Larson, M Masich, AC Snoeren, S Savage, K Levchenko Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015 | 123 | 2015 |
On the Spam Campaign Trail C Kreibich, C Kanich, K Levchenko, B Enright, GM Voelker, V Paxson, ... USENIX LEET Workshop, 2008 | 121 | 2008 |
Compressing network graphs AC Gilbert, K Levchenko Proceedings of the LinkKDD workshop at the 10th ACM Conference on KDD 124, 2004 | 121 | 2004 |