Minaxi Gupta

According to our database1, Minaxi Gupta authored at least 50 papers between 1999 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
All Your Accounts Are Belong to Us.
Proceedings of the Security and Privacy in Communication Networks, 2017

2016
Behind Box-Office Sales: Understanding the Mechanics of Automation Spam in Classifieds.
Proceedings of the Passive and Active Measurement - 17th International Conference, 2016

Characterizing Website Behaviors Across Logged-in and Not-logged-in Users.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Towards Automatic Identification of JavaScript-oriented Machine-Based Tracking.
Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 2016

Countering Phishing from Brands' Vantage Point.
Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 2016

2015
A link graph-based approach to identify forum spam.
Secur. Commun. Networks, 2015

Characterizing Credit Card Black Markets on the Web.
Proceedings of the 24th International Conference on World Wide Web Companion, 2015

~Open Resolvers: Understanding the Origins of Anomalous Open DNS Resolvers.
Proceedings of the Passive and Active Measurement - 16th International Conference, 2015

2014
Identifying fraudulently promoted online videos.
Proceedings of the 23rd International World Wide Web Conference, 2014

Leveraging Machine Learning to Improve Unwanted Resource Filtering.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014

2013
On the linkability of complementary information from free versions of people databases.
SIGMETRICS Perform. Evaluation Rev., 2013

Five Incidents, One Theme: Twitter Spam as a Weapon to Drown Voices of Protest.
Proceedings of the 3rd USENIX Workshop on Free and Open Communications on the Internet, 2013

2012
Abnormally Malicious Autonomous Systems and Their Internet Connectivity.
IEEE/ACM Trans. Netw., 2012

An approach for identifying JavaScript-loaded advertisements through static program analysis.
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012

Navigation characteristics of online social networks and search engines users.
Proceedings of the 2012 ACM workshop on Workshop on Online Social Networks, 2012

Inferring Mechanics of Web Censorship Around the World.
Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet, 2012

Twitter games: how successful spammers pick targets.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

Dissecting ghost clicks: ad fraud via misdirected human clicks.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Touring DNS Open Houses for Trends and Configurations.
IEEE/ACM Trans. Netw., 2011

The Nuts and Bolts of a Forum Spam Automator.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

Prevalence and mitigation of forum spamming.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

2010
An Internet without the Internet protocol.
Comput. Networks, 2010

Saving Energy on WiFi with Required IPsec.
Proceedings of the Security and Privacy in Communication Networks, 2010

Surveying DNS Wildcard Usage among the Good, the Bad, and the Ugly.
Proceedings of the Security and Privacy in Communication Networks, 2010

PhishNet: Predictive Blacklisting to Detect Phishing Attacks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Malicious Hubs: Detecting Abnormally Malicious Autonomous Systems.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

An empirical study of orphan DNS servers in the internet.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010

Hiding in Plain Sight: Exploiting Broadcast for Practical Host Anonymity.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

2009
Phishing Infrastructure Fluxes All the Way.
IEEE Secur. Priv., 2009

Sensitive Data Requests: Do Sites Ask Correctly?
Proceedings of IEEE International Conference on Communications, 2009

Pollution Resilience for DNS Resolvers.
Proceedings of IEEE International Conference on Communications, 2009

A Case Study on Asprox Infection Dynamics.
Proceedings of the Detection of Intrusions and Malware, 2009

A Unified Approach to Intra-domain Security.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Packet forwarding with source verification.
Comput. Networks, 2008

Exploitable Redirects on the Web: Identification, Prevalence, and Defense.
Proceedings of the 2nd USENIX Workshop on Offensive Technologies, 2008

Behind Phishing: An Examination of Phisher Modi Operandi.
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008

Understanding implications of DNS zone provisioning.
Proceedings of the 8th ACM SIGCOMM Internet Measurement Conference, 2008

2007
The web is smaller than it seems.
Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, 2007

IPSec: Performance Analysis and Enhancements.
Proceedings of IEEE International Conference on Communications, 2007

2006
Trade-offs between reliability and overheads in peer-to-peer reputation tracking.
Comput. Networks, 2006

Separating Wheat from the Chaff: A Deployable Approach to Counter Spam.
Proceedings of the 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet, 2006

Grid networks and portals - Revisiting web server workload invariants in the context of scientific web sites.
Proceedings of the ACM/IEEE SC2006 Conference on High Performance Networking and Computing, 2006

A study of malware in peer-to-peer networks.
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006

2004
Analysis of enterprise media server workloads: access patterns, locality, content evolution, and rates of change.
IEEE/ACM Trans. Netw., 2004

2003
A reputation system for peer-to-peer networks.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2003

Service Differentiation in Peer-to-Peer Networks Utilizing Reputations.
Proceedings of the Group Communications and Charges; Technology and Business Models, 2003

A novel multicast scheduling scheme for multimedia servers with variable access patterns.
Proceedings of IEEE International Conference on Communications, 2003

2002
Characterizing locality, evolution, and life span of accesses in enterprise media server workloads.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2002

Network Using Limited Branching Techniques.
Proceedings of the International Conference on Internet Computing, 2002

1999
Preprocessor Algorithm for Network Management Codebook.
Proceedings of the Workshop on Intrusion Detection and Network Monitoring, 1999


  Loading...