Understanding the network-level behavior of spammers A Ramachandran, N Feamster Proceedings of the 2006 conference on Applications, technologies …, 2006 | 851 | 2006 |
Method and system for detecting and responding to attacking networks D Dagon, N Feamster, W Lee, R Edmonds, R Lipton, A Ramachandran US Patent 8,566,928, 2013 | 510 | 2013 |
Filtering spam with behavioral blacklisting A Ramachandran, N Feamster, S Vempala Proceedings of the 14th ACM conference on computer and communications …, 2007 | 385 | 2007 |
Revealing botnet membership using dnsbl counter-intelligence. A Ramachandran, N Feamster, D Dagon Sruti 6, 49-54, 2006 | 352 | 2006 |
Can DNS-based blacklists keep up with bots? A Ramachandran, D Dagon, N Feamster CEAS, 2006 | 155 | 2006 |
Method and apparatus for identifying phishing websites in network traffic using generated regular expressions B Krishnamurthy, O Spatscheck, J Van Der Merwe, A Ramachandran US Patent 8,307,431, 2012 | 114 | 2012 |
Fast monitoring of traffic subpopulations A Ramachandran, S Seetharaman, N Feamster, V Vazirani Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, 257-270, 2008 | 94 | 2008 |
{SilverLine}: Data and Network Isolation for Cloud Services Y Mundada, A Ramachandran, N Feamster 3rd USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 11), 2011 | 67 | 2011 |
Security systems and methods to reduce data leaks in enterprise networks AV Ramachandran, YH Mundada, MMB Tariq, NG Feamster US Patent 8,893,300, 2014 | 49 | 2014 |
Packets with provenance A Ramachandran, K Bhandankar, MB Tariq, N Feamster Technical Report GT-CS-08-02, Georgia Tech, 2008 | 44 | 2008 |
Method and systems for detecting compromised networks and/or computers D Dagon, N Feamster, W Lee, R Edmonds, R Lipton, A Ramachandran US Patent 9,306,969, 2016 | 40 | 2016 |
Bitstore: An incentive-compatible solution for blocked downloads in bittorrent A Ramachandran, A Das Sarma, N Feamster Proc. Joint Workshop on The Economics of Networked Systems and Incentive …, 2007 | 38 | 2007 |
Authenticated out-of-band communication over social links AV Ramachandran, N Feamster Proceedings of the first workshop on Online social networks, 61-66, 2008 | 35 | 2008 |
Securing enterprise networks using traffic tainting A Ramachandran, Y Mundada, MB Tariq, N Feamster Proc. SIGCOMM, 1-2, 2009 | 26 | 2009 |
Methods and systems for detecting compromised computers D Dagon, N Feamster, W Lee, R Edmonds, R Lipton, A Ramachandran US Patent 10,044,748, 2018 | 17 | 2018 |
Spam or ham? characterizing and detecting fraudulent" not spam" reports in web mail systems A Ramachandran, A Dasgupta, N Feamster, K Weinberger Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti …, 2011 | 17 | 2011 |
Practical data-leak prevention for legacy applications in enterprise networks Y Mundada, A Ramachandran, MB Tariq, N Feamster Technical Report GT-CS-11-01, Georgia Institute of Technology, 2011 | 14 | 2011 |
Detecting botnet membership with dnsbl counterintelligence A Ramachandran, N Feamster, D Dagon Botnet Detection: Countering the Largest Security Threat, 131-142, 2008 | 12 | 2008 |
Silverline: preventing data leaks from compromised web applications Y Mundada, A Ramachandran, N Feamster Proceedings of the 29th Annual Computer Security Applications Conference …, 2013 | 10 | 2013 |
Decoupling policy from configuration in campus and enterprise networks N Feamster, A Nayak, H Kim, R Clark, Y Mundada, A Ramachandran, ... 2010 17th IEEE Workshop on Local & Metropolitan Area Networks (LANMAN), 1-6, 2010 | 10 | 2010 |