default search action
Minaxi Gupta
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [c41]Vlad Bulakh, Andrew J. Kaizer, Minaxi Gupta:
All Your Accounts Are Belong to Us. SecureComm 2017: 245-269 - 2016
- [c40]Vlad Bulakh, Minaxi Gupta:
Countering Phishing from Brands' Vantage Point. IWSPA@CODASPY 2016: 17-24 - [c39]Andrew J. Kaizer, Minaxi Gupta:
Towards Automatic Identification of JavaScript-oriented Machine-Based Tracking. IWSPA@CODASPY 2016: 33-40 - [c38]Andrew J. Kaizer, Minaxi Gupta:
Characterizing Website Behaviors Across Logged-in and Not-logged-in Users. Internet Measurement Conference 2016: 111-117 - [c37]Andrew J. Kaizer, Minaxi Gupta, Mejbaol Sajib, Anirban Acharjee, Qatrunnada Ismail:
Behind Box-Office Sales: Understanding the Mechanics of Automation Spam in Classifieds. PAM 2016: 248-260 - 2015
- [j9]Youngsang Shin, Steven A. Myers, Minaxi Gupta, Predrag Radivojac:
A link graph-based approach to identify forum spam. Secur. Commun. Networks 8(2): 176-188 (2015) - [c36]Andrew J. Kaizer, Minaxi Gupta:
~Open Resolvers: Understanding the Origins of Anomalous Open DNS Resolvers. PAM 2015: 3-14 - [c35]Vlad Bulakh, Minaxi Gupta:
Characterizing Credit Card Black Markets on the Web. WWW (Companion Volume) 2015: 1435-1440 - 2014
- [c34]Sruti Bhagavatula, Christopher W. Dunn, Chris Kanich, Minaxi Gupta, Brian D. Ziebart:
Leveraging Machine Learning to Improve Unwanted Resource Filtering. AISec@CCS 2014: 95-102 - [c33]Vlad Bulakh, Christopher W. Dunn, Minaxi Gupta:
Identifying fraudulently promoted online videos. WWW (Companion Volume) 2014: 1111-1116 - 2013
- [j8]Minaxi Gupta, Yuqing Melanie Wu, Swapnil S. Joshi, Aparna Tiwari, Ashish Nair, Ezhilan Ilangovan:
On the linkability of complementary information from free versions of people databases. SIGMETRICS Perform. Evaluation Rev. 40(4): 96-100 (2013) - [c32]John-Paul Verkamp, Minaxi Gupta:
Five Incidents, One Theme: Twitter Spam as a Weapon to Drown Voices of Protest. FOCI 2013 - 2012
- [j7]Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta:
Abnormally Malicious Autonomous Systems and Their Internet Connectivity. IEEE/ACM Trans. Netw. 20(1): 220-230 (2012) - [c31]Sumayah A. Alrwais, Alexandre Gerber, Christopher W. Dunn, Oliver Spatscheck, Minaxi Gupta, Eric Osterweil:
Dissecting ghost clicks: ad fraud via misdirected human clicks. ACSAC 2012: 21-30 - [c30]Vasumathi Sridharan, Vaibhav Shankar, Minaxi Gupta:
Twitter games: how successful spammers pick targets. ACSAC 2012: 389-398 - [c29]John-Paul Verkamp, Minaxi Gupta:
Inferring Mechanics of Web Censorship Around the World. FOCI 2012 - [c28]Christopher W. Dunn, Minaxi Gupta, Alexandre Gerber, Oliver Spatscheck:
Navigation characteristics of online social networks and search engines users. WOSN 2012: 43-48 - [c27]Caitlin R. Orr, Arun Chauhan, Minaxi Gupta, Christopher J. Frisz, Christopher W. Dunn:
An approach for identifying JavaScript-loaded advertisements through static program analysis. WPES 2012: 1-12 - 2011
- [j6]Andrew J. Kalafut, Craig A. Shue, Minaxi Gupta:
Touring DNS Open Houses for Trends and Configurations. IEEE/ACM Trans. Netw. 19(6): 1666-1675 (2011) - [c26]Youngsang Shin, Minaxi Gupta, Steven A. Myers:
Prevalence and mitigation of forum spamming. INFOCOM 2011: 2309-2317 - [c25]Youngsang Shin, Minaxi Gupta, Steven A. Myers:
The Nuts and Bolts of a Forum Spam Automator. LEET 2011 - 2010
- [j5]Craig A. Shue, Minaxi Gupta:
An Internet without the Internet protocol. Comput. Networks 54(18): 3232-3245 (2010) - [c24]Craig A. Shue, Minaxi Gupta:
Hiding in Plain Sight: Exploiting Broadcast for Practical Host Anonymity. HICSS 2010: 1-10 - [c23]Andrew J. Kalafut, Minaxi Gupta, Christopher A. Cole, Lei Chen, Nathan E. Myers:
An empirical study of orphan DNS servers in the internet. Internet Measurement Conference 2010: 308-314 - [c22]Andrew J. Kalafut, Craig A. Shue, Minaxi Gupta:
Malicious Hubs: Detecting Abnormally Malicious Autonomous Systems. INFOCOM 2010: 326-330 - [c21]Pawan Prakash, Manish Kumar, Ramana Rao Kompella, Minaxi Gupta:
PhishNet: Predictive Blacklisting to Detect Phishing Attacks. INFOCOM 2010: 346-350 - [c20]Youngsang Shin, Steven A. Myers, Minaxi Gupta:
Saving Energy on WiFi with Required IPsec. SecureComm 2010: 144-161 - [c19]Andrew J. Kalafut, Minaxi Gupta, Pairoj Rattadilok, Pragneshkumar Patel:
Surveying DNS Wildcard Usage among the Good, the Bad, and the Ugly. SecureComm 2010: 448-465
2000 – 2009
- 2009
- [j4]D. Kevin McGrath, Andrew J. Kalafut, Minaxi Gupta:
Phishing Infrastructure Fluxes All the Way. IEEE Secur. Priv. 7(5): 21-28 (2009) - [c18]Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta:
A Unified Approach to Intra-domain Security. CSE (3) 2009: 219-224 - [c17]Youngsang Shin, Steven A. Myers, Minaxi Gupta:
A Case Study on Asprox Infection Dynamics. DIMVA 2009: 1-20 - [c16]Andrew J. Kalafut, Minaxi Gupta:
Pollution Resilience for DNS Resolvers. ICC 2009: 1-5 - [c15]Craig A. Shue, Minaxi Gupta:
Sensitive Data Requests: Do Sites Ask Correctly? ICC 2009: 1-5 - 2008
- [j3]Craig A. Shue, Minaxi Gupta, Matthew P. Davy:
Packet forwarding with source verification. Comput. Networks 52(8): 1567-1582 (2008) - [c14]Andrew J. Kalafut, Craig A. Shue, Minaxi Gupta:
Understanding implications of DNS zone provisioning. Internet Measurement Conference 2008: 211-216 - [c13]D. Kevin McGrath, Minaxi Gupta:
Behind Phishing: An Examination of Phisher Modi Operandi. LEET 2008 - [c12]Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta:
Exploitable Redirects on the Web: Identification, Prevalence, and Defense. WOOT 2008 - 2007
- [c11]Craig A. Shue, Minaxi Gupta, Steven A. Myers:
IPSec: Performance Analysis and Enhancements. ICC 2007: 1527-1532 - [c10]Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta:
The web is smaller than it seems. Internet Measurement Conference 2007: 123-128 - 2006
- [j2]Minaxi Gupta, Mostafa H. Ammar, Mustaque Ahamad:
Trade-offs between reliability and overheads in peer-to-peer reputation tracking. Comput. Networks 50(4): 501-522 (2006) - [c9]Andrew J. Kalafut, Abhinav Acharya, Minaxi Gupta:
A study of malware in peer-to-peer networks. Internet Measurement Conference 2006: 327-332 - [c8]Anne M. Faber, Minaxi Gupta, Camilo H. Viecco:
Grid networks and portals - Revisiting web server workload invariants in the context of scientific web sites. SC 2006: 110 - [c7]Youngsang Shin, Minaxi Gupta, Rob Henderson, Aaron Emigh:
Separating Wheat from the Chaff: A Deployable Approach to Counter Spam. SRUTI 2006 - 2004
- [j1]Ludmila Cherkasova, Minaxi Gupta:
Analysis of enterprise media server workloads: access patterns, locality, content evolution, and rates of change. IEEE/ACM Trans. Netw. 12(5): 781-794 (2004) - 2003
- [c6]Minaxi Gupta, Mostafa H. Ammar:
A novel multicast scheduling scheme for multimedia servers with variable access patterns. ICC 2003: 875-879 - [c5]Minaxi Gupta, Mostafa H. Ammar:
Service Differentiation in Peer-to-Peer Networks Utilizing Reputations. Networked Group Communication 2003: 70-82 - [c4]Minaxi Gupta, Paul Judge, Mostafa H. Ammar:
A reputation system for peer-to-peer networks. NOSSDAV 2003: 144-152 - 2002
- [c3]Minaxi Gupta, Mostafa H. Ammar:
Network Using Limited Branching Techniques. International Conference on Internet Computing 2002: 156-163 - [c2]Ludmila Cherkasova, Minaxi Gupta:
Characterizing locality, evolution, and life span of accesses in enterprise media server workloads. NOSSDAV 2002: 33-42
1990 – 1999
- 1999
- [c1]Minaxi Gupta, Mani Subramanian:
Preprocessor Algorithm for Network Management Codebook. Workshop on Intrusion Detection and Network Monitoring 1999: 93-102
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint