A multifaceted approach to understanding the botnet phenomenon M Abu Rajab, J Zarfoss, F Monrose, A Terzis Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, 41-52, 2006 | 985 | 2006 |
All your iframes point to us N Provos, P Mavrommatis, M Rajab, F Monrose | 693 | 2008 |
My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging M Fabian, MA Terzis Proceedings of the 1st USENIX Workshop on Hot Topics in Understanding …, 2007 | 341 | 2007 |
Manufacturing compromise: the emergence of exploit-as-a-service C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ... Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 306 | 2012 |
Ad injection at scale: Assessing deceptive advertisement modifications K Thomas, E Bursztein, C Grier, G Ho, N Jagpal, A Kapravelos, D McCoy, ... 2015 IEEE Symposium on Security and Privacy, 151-167, 2015 | 163 | 2015 |
Cybercrime 2.0: when the cloud turns dark N Provos, MA Rajab, P Mavrommatis Communications of the ACM 52 (4), 42-47, 2009 | 130 | 2009 |
On the Effectiveness of Distributed Worm Monitoring. MA Rajab, F Monrose, A Terzis USENIX Security Symposium, 15, 2005 | 118 | 2005 |
Trends and lessons from three years fighting malicious extensions N Jagpal, E Dingle, JP Gravel, P Mavrommatis, N Provos, MA Rajab, ... 24th USENIX Security Symposium (USENIX Security 15), 579-593, 2015 | 115 | 2015 |
CAMP: Content-Agnostic Malware Protection. MA Rajab, L Ballard, N Lutz, P Mavrommatis, N Provos NDSS, 2013 | 98 | 2013 |
The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution. MA Rajab, L Ballard, P Mavrommatis, N Provos, X Zhao LEET, 2010 | 95 | 2010 |
Investigating Commercial {Pay-Per-Install} and the Distribution of Unwanted Software K Thomas, JAE Crespo, R Rasti, JM Picod, C Phillips, MA Decoste, ... 25th USENIX Security Symposium (USENIX Security 16), 721-739, 2016 | 91 | 2016 |
Trends in circumventing web-malware detection M Rajab, L Ballard, N Jagpal, P Mavrommatis, D Nojiri, N Provos, ... Google, Google Technical Report 168, 2011 | 88 | 2011 |
All your iframes point to us NPP Mavrommatis, M Monrose USENIX security symposium, 1-16, 2008 | 80 | 2008 |
On the impact of dynamic addressing on malware propagation M Abu Rajab, F Monrose, A Terzis Proceedings of the 4th ACM workshop on Recurring malcode, 51-56, 2006 | 45 | 2006 |
Fast and evasive attacks: Highlighting the challenges ahead MA Rajab, F Monrose, A Terzis Recent Advances in Intrusion Detection: 9th International Symposium, RAID …, 2006 | 45 | 2006 |
Requirements on worm mitigation technologies in MANETS RG Cole, N Phamdo, MA Rajab, A Terzis Workshop on Principles of Advanced and Distributed Simulation (PADS'05), 207-214, 2005 | 42 | 2005 |
Peeking through the cloud: DNS-based estimation and its applications MA Rajab, F Monrose, A Terzis, N Provos Applied Cryptography and Network Security: 6th International Conference …, 2008 | 40 | 2008 |
Worm evolution tracking via timing analysis M Abu Rajab, F Monrose, A Terzis Proceedings of the 2005 ACM workshop on Rapid malcode, 52-59, 2005 | 34 | 2005 |
Exploration system and method for analyzing behavior of binary executable programs MA Rajab, X Zhao, N Provos US Patent 9,215,245, 2015 | 18 | 2015 |
Peeking through the cloud: Client density estimation via dns cache probing MA Rajab, F Monrose, N Provos ACM Transactions on Internet Technology (TOIT) 10 (3), 1-21, 2010 | 14 | 2010 |