Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Levchenko, Kirill
add a person with the name Levchenko, Kirill
 

Other publications of authors with the same name

Show Me the Money: Characterizing Spam-advertised Revenue., , , , , , , , and . USENIX Security Symposium, USENIX Association, (2011)No Plan Survives Contact: Experience with Cybercrime Measurement., , , , , , , , and . CSET, USENIX Association, (2011)Spamcraft: An Inside Look At Spam Campaign Orchestration., , , , , , and . LEET, USENIX Association, (2009)Storm: When Researchers Collide., , , , and . ;login:, (2008)The BIZ Top-Level Domain: Ten Years Later., , , , , , , and . PAM, volume 7192 of Lecture Notes in Computer Science, page 221-230. Springer, (2012)An analysis of underground forums., , , , and . Internet Measurement Conference, page 71-80. ACM, (2011)Characterizing Large-Scale Click Fraud in ZeroAccess., , , , , , , , and . ACM Conference on Computer and Communications Security, page 141-152. ACM, (2014)XXXtortion?: inferring registration intent in the .XXX TLD., , , and . WWW, page 901-912. ACM, (2014)Router Support for Fine-Grained Latency Measurements., , , and . IEEE/ACM Trans. Netw., 20 (3): 811-824 (2012)On the Spam Campaign Trail., , , , , , and . LEET, USENIX Association, (2008)