Sotabase
Home
Researchers
Career
·
Professor
,
University of California, San Diego
2000–
Publications
(219)
On the placement of Web server replicas
Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213) · 2001
951
cited
Beyond blacklists: learning to detect malicious web sites from suspicious URLs
Knowledge Discovery and Data Mining · 2009
924
cited
Total Recall: System Support for Automated Availability Management
Symposium on Networked Systems Design and Implementation · 2004
626
cited
Identifying suspicious URLs: an application of large-scale online learning
International Conference on Machine Learning · 2009
613
cited
On the scale and performance of cooperative Web proxy caching
Symposium on Operating Systems Principles · 1999
609
cited
Internet quarantine: requirements for containing self-propagating code
IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428) · 2003
595
cited
Understanding Availability
International Workshop on Peer-to-Peer Systems · 2003
554
cited
A fistful of bitcoins: characterizing payments among men with no names
ACM/SIGCOMM Internet Measurement Conference · 2013
462
cited
Scalability, fidelity, and containment in the potemkin virtual honeyfarm
Symposium on Operating Systems Principles · 2005
401
cited
End-to-end differentiation of congestion and wireless losses
TNET · 2001
398
cited
Sora
Symposium on Networked Systems Design and Implementation · 2009
389
cited
Jigsaw: solving the puzzle of enterprise 802.11 analysis
Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication · 2006
365
cited
Access and mobility of wireless PDA users
MOCO · 2003
352
cited
An analysis of underground forums
ACM/SIGCOMM Internet Measurement Conference · 2011
337
cited
Spamalytics: an empirical analysis of spam marketing conversion
CACM · 2009
329
cited
Difference engine
USENIX Symposium on Operating Systems Design and Implementation · 2008
314
cited
Measurement and Analysis of a Streaming Media Workload
USENIX Symposium on Internet Technologies and Systems · 2001
308
cited
Click Trajectories: End-to-End Analysis of the Spam Value Chain
IEEE Symposium on Security and Privacy · 2011
302
cited
Beyond heuristics: learning to classify vulnerabilities and predict exploits
Knowledge Discovery and Data Mining · 2010
277
cited
Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context
USENIX Security Symposium · 2010
258
cited
Show all 219 papers →
Sotabase