| A multifaceted approach to understanding the botnet phenomenon M Abu Rajab, J Zarfoss, F Monrose, A Terzis Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, 41-52, 2006 | 1006 | 2006 |
| All your iframes point to us NPP Mavrommatis, M Monrose USENIX security symposium, 1-16, 2008 | 767 | 2008 |
| My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging M Fabian, MA Terzis Proceedings of the 1st USENIX Workshop on Hot Topics in Understanding …, 2007 | 345 | 2007 |
| Manufacturing compromise: the emergence of exploit-as-a-service C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ... Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 309 | 2012 |
| Ad injection at scale: Assessing deceptive advertisement modifications K Thomas, E Bursztein, C Grier, G Ho, N Jagpal, A Kapravelos, D McCoy, ... 2015 IEEE Symposium on Security and Privacy, 151-167, 2015 | 181 | 2015 |
| Trends and lessons from three years fighting malicious extensions N Jagpal, E Dingle, JP Gravel, P Mavrommatis, N Provos, MA Rajab, ... 24th USENIX Security Symposium (USENIX Security 15), 579-593, 2015 | 134 | 2015 |
| Cybercrime 2.0: when the cloud turns dark N Provos, MA Rajab, P Mavrommatis Communications of the ACM 52 (4), 42-47, 2009 | 133 | 2009 |
| On the Effectiveness of Distributed Worm Monitoring. MA Rajab, F Monrose, A Terzis USENIX Security Symposium, 15, 2005 | 114 | 2005 |
| CAMP: Content-Agnostic Malware Protection. MA Rajab, L Ballard, N Lutz, P Mavrommatis, N Provos NDSS, 2013 | 104 | 2013 |
| Investigating commercial {Pay-Per-Install} and the distribution of unwanted software K Thomas, JAE Crespo, R Rasti, JM Picod, C Phillips, MA Decoste, ... 25th USENIX Security Symposium (USENIX Security 16), 721-739, 2016 | 95 | 2016 |
| The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution. MA Rajab, L Ballard, P Mavrommatis, N Provos, X Zhao LEET, 2010 | 94 | 2010 |
| Trends in circumventing web-malware detection M Rajab, L Ballard, N Jagpal, P Mavrommatis, D Nojiri, N Provos, ... Google, Google Technical Report, 2011 | 85 | 2011 |
| On the impact of dynamic addressing on malware propagation M Abu Rajab, F Monrose, A Terzis Proceedings of the 4th ACM workshop on Recurring malcode, 51-56, 2006 | 46 | 2006 |
| Fast and evasive attacks: Highlighting the challenges ahead MA Rajab, F Monrose, A Terzis International Workshop on Recent Advances in Intrusion Detection, 206-225, 2006 | 46 | 2006 |
| Peeking through the cloud: DNS-based estimation and its applications MA Rajab, F Monrose, A Terzis, N Provos International Conference on Applied Cryptography and Network Security, 21-38, 2008 | 45 | 2008 |
| Requirements on worm mitigation technologies in MANETS RG Cole, N Phamdo, MA Rajab, A Terzis Workshop on Principles of Advanced and Distributed Simulation (PADS'05), 207-214, 2005 | 43 | 2005 |
| Worm evolution tracking via timing analysis M Abu Rajab, F Monrose, A Terzis Proceedings of the 2005 ACM workshop on Rapid malcode, 52-59, 2005 | 33 | 2005 |
| Exploration system and method for analyzing behavior of binary executable programs MA Rajab, X Zhao, N Provos US Patent 9,215,245, 2015 | 18 | 2015 |
| Peeking through the cloud: Client density estimation via dns cache probing MA Rajab, F Monrose, N Provos ACM Transactions on Internet Technology (TOIT) 10 (3), 1-21, 2010 | 14 | 2010 |
| 10th USENIX Security Symposium DASSN Provos, P Mavrommatis, M Rajab, F Monrose Washington, DC, August, 2001 | 11 | 2001 |