Gary Warner

Orcid: 0000-0002-5595-9652

According to our database1, Gary Warner authored at least 31 papers between 2008 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
Exploitation of ICMP time exceeded packets for a large-scale router delay analysis.
Int. Arab J. Inf. Technol., 2019

A flow-based approach for Trickbot banking trojan detection.
Comput. Secur., 2019

2018
Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis.
Proceedings of the 2018 APWG Symposium on Electronic Crime Research, 2018

2017
Malware Secrets: De-Obfuscating in the Cloud.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
Social Media Image Retrieval Using Distilled Convolutional Neural Network for Suspicious e-Crime and Terrorist Account Detection.
Proceedings of the IEEE International Symposium on Multimedia, 2016

2015
Object-of-Interest Retrieval in Social Media Image Databases for e-Crime Forum Detection.
Int. J. Multim. Data Eng. Manag., 2015

Spammer success through customization and randomization of URLs.
Proceedings of the 2015 APWG Symposium on Electronic Crime Research, 2015

2014
New tackle to catch a phisher.
Int. J. Electron. Secur. Digit. Forensics, 2014

Using String Information for Malware Family Identification.
Proceedings of the Advances in Artificial Intelligence - IBERAMIA 2014, 2014

UDaaS: A Cloud-Based URL-Deduplication-as-a-Service for Big Datasets.
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014

CURLA: Cloud-Based Spam URL Analyzer for Very Large Datasets.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

2013
Using closed frequent sets to cluster malwares.
Proceedings of the XXIV International Symposium on Information, 2013

Phish-Net: Investigating phish clusters using drop email addresses.
Proceedings of the 2013 APWG eCrime Researchers Summit, 2013

2012
Profiling Online Auction Sellers Using Image-Editing Styles.
IEEE Multim., 2012

Clustering Potential Phishing Websites Using DeepMD5.
Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2012

Explaining Cybercrime through the Lens of Differential Association Theory, Hadidi44-2.php PayPal Case Study.
Proceedings of the 2012 eCrime Researchers Summit, 2012

2011
Analysis of Back-Doored Phishing Kits.
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011

High-performance content-based phishing attack detection.
Proceedings of the 2011 eCrime Researchers Summit, 2011

Phishing: Crime that pays.
Proceedings of the 2011 eCrime Researchers Summit, 2011

Evaluating a semisupervised approach to phishing url identification in a realistic scenario.
Proceedings of the 8th Annual Collaboration, 2011

2010
Clustering Spam Domains and Destination Websites: Digital Forensics with Data Mining.
J. Digit. Forensics Secur. Law, 2010

Koobface: The evolution of the social botnet.
Proceedings of the 2010 eCrime Researchers Summit, 2010

Lexical feature based phishing URL detection using online learning.
Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, 2010

2009
A Multimodal Data Mining Framework for Revealing Common Sources of Spam Images.
J. Multim., 2009

Spam Image Clustering for Identifying Common Sources of Unsolicited Emails.
Int. J. Digit. Crime Forensics, 2009

Revealing common sources of image spam by unsupervised clustering with visual features.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Clustering malware-generated spam emails with a novel fuzzy string matching algorithm.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Identifying vulnerable websites by analysis of common strings in phishing URLs.
Proceedings of the 2009 eCrime Researchers Summit, 2009

2008
Mining spam email to identify common origins for forensic application.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Automating phishing website identification through deep MD5 matching.
Proceedings of the 2008 eCrime Researchers Summit, 2008

Detection of networks blocks used by the Storm Worm botnet.
Proceedings of the 46th Annual Southeast Regional Conference, 2008


  Loading...