Author of the publication

Beyond blacklists: learning to detect malicious web sites from suspicious URLs.

, , , and . KDD, page 1245-1254. ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the empirical performance of self-calibrating WiFi location systems., , and . LCN, page 76-84. IEEE Computer Society, (2011)AFRAID - A Frequently Redundant Array of Independent Disks., and . USENIX Annual Technical Conference, page 27-39. USENIX Association, (1996)BlueSky: a cloud-backed file system for the enterprise., , and . FAST, page 19. USENIX Association, (2012)Detecting and Isolating Malicious Routers., , , and . IEEE Trans. Dependable Sec. Comput., 3 (3): 230-244 (2006)PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs., , , , , , , , and . USENIX Security Symposium, page 1-16. USENIX Association, (2012)Too LeJIT to Quit: Extending JIT Spraying to ARM., , and . NDSS, The Internet Society, (2015)You've Got Vulnerability: Exploring Effective Vulnerability Notifications., , , , , , , and . USENIX Security Symposium, page 1033-1050. USENIX Association, (2016)Framing Dependencies Introduced by Underground Commoditization., , , , , , , , , and . WEIS, (2015)Difference engine: harnessing memory redundancy in virtual machines., , , , , , , and . Commun. ACM, 53 (10): 85-93 (2010)A fistful of Bitcoins: characterizing payments among men with no names., , , , , , and . Commun. ACM, 59 (4): 86-93 (2016)