An Analysis of Underground Forums M Motoyama, D McCoy, K Levchenko, S Savage, GM Voelker | 395 | 2011 |
Re: CAPTCHAs–Understanding CAPTCHA-solving services in an economic context M Motoyama, K Levchenko, C Kanich, D McCoy, GM Voelker, S Savage USENIX Security Symposium 10, 2010 | 301 | 2010 |
I seek you: searching and matching individuals in social networks M Motoyama, G Varghese Proceedings of the eleventh international workshop on Web information and …, 2009 | 151 | 2009 |
Dirty jobs: The role of freelance labor in web service abuse M Motoyama, D McCoy, K Levchenko, S Savage, GM Voelker Proceedings of the 20th USENIX Security Symposium, 2011 | 131 | 2011 |
Measuring online service availability using twitter M Motoyama, B Meeder, K Levchenko, GM Voelker, S Savage WOSN’10, 13-13, 2010 | 64 | 2010 |
No plan survives contact: experience with cybercrime measurement C Kanich, N Chachra, D McCoy, C Grier, D Wang, M Motoyama, ... Proc. of 4th USENIX CSET, 2011 | 28 | 2011 |
Crosstalk: scalably interconnecting instant messaging networks MA Motoyama, G Varghese Proceedings of the 2nd ACM workshop on Online social networks, 61-68, 2009 | 23 | 2009 |
Topic modeling of freelance job postings to monitor web service abuse D Kim, M Motoyama, GM Voelker, LK Saul Proceedings of the 4th ACM workshop on Security and artificial intelligence …, 2011 | 16 | 2011 |
Understanding the role of outsourced labor in web service abuse MA Motoyama | 2 | 2011 |
DoS Hardened SIP Proxies M Greenwald, E Grosse, D Liu, M Motoyama | | 2005 |