Honeycomb: creating intrusion detection signatures using honeypots C Kreibich, J Crowcroft ACM SIGCOMM computer communication review 34 (1), 51-56, 2004 | 1125 | 2004 |
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics C Kreibich, M Handley, V Paxson Proc. USENIX Security Symposium 2001, 2001 | 692 | 2001 |
Spamalytics: An empirical analysis of spam marketing conversion C Kanich, C Kreibich, K Levchenko, B Enright, GM Voelker, V Paxson, ... Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 582 | 2008 |
Netalyzr: Illuminating the edge network C Kreibich, N Weaver, B Nechaev, V Paxson Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 246-259, 2010 | 455 | 2010 |
Measuring pay-per-install: the commoditization of malware distribution. J Caballero, C Grier, C Kreibich, V Paxson Usenix security symposium 13, 1-13, 2011 | 391 | 2011 |
Click trajectories: End-to-end analysis of the spam value chain K Levchenko, A Pitsillidis, N Chachra, B Enright, M Félegyházi, C Grier, ... 2011 ieee symposium on security and privacy, 431-446, 2011 | 363 | 2011 |
Dispatcher: Enabling active botnet infiltration using automatic protocol reverse-engineering J Caballero, P Poosankam, C Kreibich, D Song Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 347 | 2009 |
Unexpected means of protocol inference J Ma, K Levchenko, C Kreibich, S Savage, GM Voelker Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, 313-326, 2006 | 307 | 2006 |
Prudent practices for designing malware experiments: Status quo and outlook C Rossow, CJ Dietrich, C Grier, C Kreibich, V Paxson, N Pohlmann, ... 2012 IEEE symposium on security and privacy, 65-79, 2012 | 270 | 2012 |
Apps, trackers, privacy, and regulators: A global study of the mobile tracking ecosystem A Razaghpanah, R Nithyanand, N Vallina-Rodriguez, S Sundaresan, ... The 25th Annual Network and Distributed System Security Symposium (NDSS 2018), 2018 | 244 | 2018 |
On the Potential of Proactive Domain Blacklisting. M Felegyhazi, C Kreibich, V Paxson LEET 10, 6-6, 2010 | 239 | 2010 |
Architecture of a network monitor A Moore, J Hall, C Kreibich, E Harris, I Pratt Passive & Active Measurement Workshop 2003, 2003 | 173 | 2003 |
Pharmaleaks: Understanding the business of online pharmaceutical affiliate programs D McCoy, A Pitsillidis, G Jordan, N Weaver, C Kreibich, B Krebs, ... Proceedings of the 21st USENIX conference on Security symposium, 1-1, 2012 | 169 | 2012 |
Show Me the Money: Characterizing Spam-advertised Revenue. C Kanich, N Weaver, D McCoy, T Halvorson, C Kreibich, K Levchenko, ... USENIX Security Symposium 35, 2011 | 163 | 2011 |
Recent Advances in Intrusion Detection JHA SOMESH, R SOMMER, C KREIBICH vol 6307, 15, 2010 | 148 | 2010 |
Spamcraft: An Inside Look At Spam Campaign Orchestration. C Kreibich, C Kanich, K Levchenko, B Enright, GM Voelker, V Paxson, ... LEET, 2009 | 131 | 2009 |
Botnet Judo: Fighting Spam with Itself. A Pitsillidis, K Levchenko, C Kreibich, C Kanich, GM Voelker, V Paxson, ... NDSS, 2010 | 124 | 2010 |
On the spam campaign trail. C Kreibich, C Kanich, K Levchenko, B Enright, GM Voelker, V Paxson, ... LEET 8 (2008), 1-9, 2008 | 122 | 2008 |
Understanding the domain registration behavior of spammers S Hao, M Thomas, V Paxson, N Feamster, C Kreibich, C Grier, ... Proceedings of the 2013 conference on Internet measurement conference, 63-76, 2013 | 112 | 2013 |
What’s clicking what? techniques and innovations of today’s clickbots B Miller, P Pearce, C Grier, C Kreibich, V Paxson Detection of Intrusions and Malware, and Vulnerability Assessment: 8th …, 2011 | 112 | 2011 |