Minaxi Gupta

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2017
All Your Accounts Are Belong to Us.
Proceedings of the Security and Privacy in Communication Networks, 2017

2016
Behind Box-Office Sales: Understanding the Mechanics of Automation Spam in Classifieds.
Proceedings of the Passive and Active Measurement - 17th International Conference, 2016

Characterizing Website Behaviors Across Logged-in and Not-logged-in Users.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Towards Automatic Identification of JavaScript-oriented Machine-Based Tracking.
Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 2016

Countering Phishing from Brands' Vantage Point.
Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 2016

2015
Characterizing Credit Card Black Markets on the Web.
Proceedings of the 24th International Conference on World Wide Web Companion, 2015

~Open Resolvers: Understanding the Origins of Anomalous Open DNS Resolvers.
Proceedings of the Passive and Active Measurement - 16th International Conference, 2015

2014
Identifying fraudulently promoted online videos.
Proceedings of the 23rd International World Wide Web Conference, 2014

Leveraging Machine Learning to Improve Unwanted Resource Filtering.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014

2013
On the linkability of complementary information from free versions of people databases.
SIGMETRICS Perform. Evaluation Rev., 2013

Five Incidents, One Theme: Twitter Spam as a Weapon to Drown Voices of Protest.
Proceedings of the 3rd USENIX Workshop on Free and Open Communications on the Internet, 2013

2012
An approach for identifying JavaScript-loaded advertisements through static program analysis.
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012

Navigation characteristics of online social networks and search engines users.
Proceedings of the 2012 ACM workshop on Workshop on Online Social Networks, 2012

Inferring Mechanics of Web Censorship Around the World.
Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet, 2012

Twitter games: how successful spammers pick targets.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

Dissecting ghost clicks: ad fraud via misdirected human clicks.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2010
PhishNet: Predictive Blacklisting to Detect Phishing Attacks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2008
Behind Phishing: An Examination of Phisher Modi Operandi.
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008

2006
Separating Wheat from the Chaff: A Deployable Approach to Counter Spam.
Proceedings of the 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet, 2006

Grid networks and portals - Revisiting web server workload invariants in the context of scientific web sites.
Proceedings of the ACM/IEEE SC2006 Conference on High Performance Networking and Computing, 2006

2004
Analysis of enterprise media server workloads: access patterns, locality, content evolution, and rates of change.
IEEE/ACM Trans. Netw., 2004

2002
Characterizing locality, evolution, and life span of accesses in enterprise media server workloads.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2002

1999
Preprocessor Algorithm for Network Management Codebook.
Proceedings of the Workshop on Intrusion Detection and Network Monitoring, 1999


  Loading...