An Analysis of Underground Forums M Motoyama, D McCoy, K Levchenko, S Savage, GM Voelker | 382 | 2011 |
Re: CAPTCHAs–Understanding CAPTCHA-solving services in an economic context M Motoyama, K Levchenko, C Kanich, D McCoy, GM Voelker, S Savage USENIX Security Symposium 10, 2010 | 292 | 2010 |
I seek you: searching and matching individuals in social networks M Motoyama, G Varghese Proceedings of the eleventh international workshop on Web information and …, 2009 | 147 | 2009 |
Dirty jobs: The role of freelance labor in web service abuse M Motoyama, D McCoy, K Levchenko, S Savage, GM Voelker Proceedings of the 20th USENIX Security Symposium, 2011 | 130 | 2011 |
Measuring online service availability using twitter M Motoyama, B Meeder, K Levchenko, GM Voelker, S Savage WOSN’10, 13-13, 2010 | 61 | 2010 |
No plan survives contact: experience with cybercrime measurement C Kanich, N Chachra, D McCoy, C Grier, D Wang, M Motoyama, ... Proc. of 4th USENIX CSET, 2011 | 29 | 2011 |
Crosstalk: scalably interconnecting instant messaging networks MA Motoyama, G Varghese Proceedings of the 2nd ACM workshop on Online social networks, 61-68, 2009 | 23 | 2009 |
Topic modeling of freelance job postings to monitor web service abuse D Kim, M Motoyama, GM Voelker, LK Saul Proceedings of the 4th ACM workshop on Security and artificial intelligence …, 2011 | 17 | 2011 |
Understanding the role of outsourced labor in web service abuse MA Motoyama | 1 | 2011 |
DoS Hardened SIP Proxies M Greenwald, E Grosse, D Liu, M Motoyama | | 2005 |