Analysis of malware download sites by focusing on time series variation of malware
暂无分享,去创建一个
[1] V. N. Venkatakrishnan,et al. WebWinnow: leveraging exploit kit workflows to detect malicious urls , 2014, CODASPY '14.
[2] Juan Caballero,et al. The MALICIA dataset: identification and analysis of drive-by download operations , 2014, International Journal of Information Security.
[3] Mitsuaki Akiyama,et al. Active Credential Leakage for Observing Web-Based Attack Cycle , 2013, RAID.
[4] Kevin C. Almeroth,et al. FIRE: FInding Rogue nEtworks , 2009, 2009 Annual Computer Security Applications Conference.
[5] Craig A. Shue,et al. Abnormally Malicious Autonomous Systems and Their Internet Connectivity , 2012, IEEE/ACM Transactions on Networking.
[6] Stefan Savage,et al. Manufacturing compromise: the emergence of exploit-as-a-service , 2012, CCS.
[7] Roberto Perdisci,et al. WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths , 2015, USENIX Security Symposium.
[8] Mitsuaki Akiyama,et al. Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks , 2010, IEICE Trans. Commun..
[9] Niels Provos,et al. All Your iFRAMEs Point to Us , 2008, USENIX Security Symposium.
[10] Konstantin Beznosov,et al. Improving malicious URL re-evaluation scheduling through an empirical study of malware download centers , 2011, WebQuality '11.