Sciweavers

4 search results - page 1 / 1
» Proactive obfuscation
Sort
View
TOCS
2010
61views more  TOCS 2010»
13 years 3 months ago
Proactive obfuscation
Tom Roeder, Fred B. Schneider
CMS
2006
13 years 6 months ago
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation
Abstract. Sophisticated worms that use precomputed hitlists of vulnerable targets are especially hard to contain, since they are harder to detect, and spread at rates where even au...
Spyros Antonatos, Kostas G. Anagnostakis
CORR
2010
Springer
286views Education» more  CORR 2010»
13 years 2 months ago
PhishDef: URL Names Say It All
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...
Anh Le, Athina Markopoulou, Michalis Faloutsos
CNIS
2006
13 years 6 months ago
Dynamically blocking access to web pages for spammers' harvesters
Almost all current anti spam measures are reactive, filtering being the most common. But to react means always to be one step behind. Reaction requires to predict the next action ...
Tobias Eggendorfer, Jörg Keller