Search Results - "H. P. Chaves, Marcelo"

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    Identifying and Characterizing Bashlite and Mirai C&C Servers by Bastos, Gabriel, Marzano, Artur, Fonseca, Osvaldo, Fazzion, Elverton, Hoepers, Cristine, Steding-Jessen, Klaus, Marcelo H. P. C., Chaves, Cunha, Italo, Guedes, Dorgival, Meira, Wagner

    “…IoT devices are often a vector for assembling massive botnets, as a consequence of being broadly available, having limited security protections, and…”
    Get full text
    Conference Proceeding
  2. 2

    SpamBands: a Methodology to Identify Sources of Spam Acting in Concert by Fazzion, Elverton, Fonseca, Osvaldo, Henrique B. Las Casas, Pedro, Guedes, Dorgival, Meira Jr, Wagner, Hoepers, Cristine, Steding Jessen, Klaus, H. P. Chaves, Marcelo

    Published in Revista IEEE América Latina (01-06-2016)
    “…In 2012, estimates indicated that 68.8% of all e-mail traffic was spam, what suggests this is still a relevant problem. Recently, some works have focused on…”
    Get full text
    Journal Article
  3. 3

    The Evolution of Bashlite and Mirai IoT Botnets by Marzano, Artur, Alexander, David, Fonseca, Osvaldo, Fazzion, Elverton, Hoepers, Cristine, Steding-Jessen, Klaus, Chaves, Marcelo H. P. C., Cunha, Italo, Guedes, Dorgival, Meira, Wagner

    “…Vulnerable IoT devices are powerful platforms for building botnets that cause billion-dollar losses every year. In this work, we study Bashlite botnets and…”
    Get full text
    Conference Proceeding
  4. 4

    Neighborhoods and bands: an analysis of the origins of spam by Fonseca, Osvaldo, Fazzion, Elverton, B Las-Casas, Pedro Henrique, Guedes, Dorgival, Meira, Wagner, Hoepers, Cristine, Steding-Jessen, Klaus, Chaves, Marcelo HP

    “…Despite the continuous efforts to mitigate spam, the volume of such messages continues to grow and identifying spammers is still a challenge. Spam traffic…”
    Get full text
    Journal Article
  5. 5

    A Spam Traffic Cost Analysis for Network Operators by Fonseca, Osvaldo, Fazzion, Elverton, Cunha, Italo, Las-Casas, Pedro, Guedes, Dorgival, Meira, Wagner, Hoepers, Cristine, Steding-Jessen, Klaus, Chaves, Marcelo H. P. C.

    “…Spam messages are used to disseminate malware, make phishing attacks, and advertise illegal products. Spam generates costs to users, e.g., victims of phishing,…”
    Get full text
    Conference Proceeding
  6. 6

    Measuring, Characterizing, and Avoiding Spam Traffic Costs by Fonseca, Osvaldo, Fazzion, Elverton, Cunha, Italo, Bragioni Las-Casas, Pedro Henrique, Guedes, Dorgival, Meira, Wagner, Hoepers, Cristine, Steding-Jessen, Klaus, Chaves, Marcelo H. P.

    Published in IEEE internet computing (01-07-2016)
    “…Spam messages propagate malware, disseminate phishing exploits, and advertise illegal products. Those messages generate costs for users and network operators,…”
    Get full text
    Journal Article
  7. 7

    Neighborhoods or Condominiums: An Analysis of the Origin of Spam Based on the Organization of Autonomous Systems by Fonseca, Osvaldo, Las-Casas, Pedro, Fazzion, Elverton, Guedes, Dorgival, Meira, Wagner, Hoepers, Cristine, Steding-Jessen, Klaus, Chaves, Marcelo H.P.

    “…Despite the continuous efforts to mitigate spam, the volume of messages is huge and identifying spammers is still a challenge. Spam traffic analysis has been…”
    Get full text
    Conference Proceeding