Honeycomb: creating intrusion detection signatures using honeypots C Kreibich, J Crowcroft ACM SIGCOMM computer communication review 34 (1), 51-56, 2004 | 1188 | 2004 |
Network Intrusion Detection: Evasion, Traffic Normalization, and {End-to-End} Protocol Semantics M Handley, V Paxson, C Kreibich 10th USENIX Security Symposium (USENIX Security 01), 2001 | 704 | 2001 |
Spamalytics: An empirical analysis of spam marketing conversion C Kanich, C Kreibich, K Levchenko, B Enright, GM Voelker, V Paxson, ... Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 596 | 2008 |
Netalyzr: Illuminating the edge network C Kreibich, N Weaver, B Nechaev, V Paxson Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 246-259, 2010 | 469 | 2010 |
Measuring {Pay-per-Install}: The commoditization of malware distribution J Caballero, C Grier, C Kreibich, V Paxson 20th USENIX Security Symposium (USENIX Security 11), 2011 | 411 | 2011 |
Click trajectories: End-to-end analysis of the spam value chain K Levchenko, A Pitsillidis, N Chachra, B Enright, M Félegyházi, C Grier, ... 2011 ieee symposium on security and privacy, 431-446, 2011 | 376 | 2011 |
Dispatcher: Enabling active botnet infiltration using automatic protocol reverse-engineering J Caballero, P Poosankam, C Kreibich, D Song Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 366 | 2009 |
Prudent practices for designing malware experiments: Status quo and outlook C Rossow, CJ Dietrich, C Grier, C Kreibich, V Paxson, N Pohlmann, ... 2012 IEEE symposium on security and privacy, 65-79, 2012 | 319 | 2012 |
Unexpected means of protocol inference J Ma, K Levchenko, C Kreibich, S Savage, GM Voelker Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, 313-326, 2006 | 316 | 2006 |
Apps, trackers, privacy, and regulators: A global study of the mobile tracking ecosystem A Razaghpanah, R Nithyanand, N Vallina-Rodriguez, S Sundaresan, ... The 25th annual network and distributed system security symposium (NDSS 2018), 2018 | 307 | 2018 |
On the Potential of Proactive Domain Blacklisting. M Felegyhazi, C Kreibich, V Paxson LEET 10, 6-6, 2010 | 255 | 2010 |
{PharmaLeaks}: Understanding the Business of Online Pharmaceutical Affiliate Programs D McCoy, A Pitsillidis, J Grant, N Weaver, C Kreibich, B Krebs, G Voelker, ... 21st USENIX Security Symposium (USENIX Security 12), 1-16, 2012 | 179 | 2012 |
Recent Advances in Intrusion Detection JHA SOMESH, R SOMMER, C KREIBICH vol 6307, 15, 2010 | 175 | 2010 |
Architecture of a network monitor A Moore, J Hall, C Kreibich, E Harris, I Pratt Passive & Active Measurement Workshop 2003, 2003 | 173 | 2003 |
Show me the money: Characterizing spam-advertised revenue C Kanich, N Weaver, D McCoy, T Halvorson, C Kreibich, K Levchenko, ... 20th USENIX Security Symposium (USENIX Security 11), 2011 | 167 | 2011 |
Spamcraft: An Inside Look At Spam Campaign Orchestration. C Kreibich, C Kanich, K Levchenko, B Enright, GM Voelker, V Paxson, ... LEET, 2009 | 137 | 2009 |
Botnet Judo: Fighting Spam with Itself. A Pitsillidis, K Levchenko, C Kreibich, C Kanich, GM Voelker, V Paxson, ... NDSS, 2010 | 129 | 2010 |
Understanding the domain registration behavior of spammers S Hao, M Thomas, V Paxson, N Feamster, C Kreibich, C Grier, ... Proceedings of the 2013 conference on Internet measurement conference, 63-76, 2013 | 126 | 2013 |
On the spam campaign trail. C Kreibich, C Kanich, K Levchenko, B Enright, GM Voelker, V Paxson, ... LEET 8 (2008), 1-9, 2008 | 121 | 2008 |
Haystack: In situ mobile traffic analysis in user space A Razaghpanah, N Vallina-Rodriguez, S Sundaresan, C Kreibich, P Gill, ... arXiv preprint arXiv:1510.01419, 1-13, 2015 | 111 | 2015 |