Analysis of the Similarities in Malicious DNS Domain Names
暂无分享,去创建一个
[1] Jack W. Stokes,et al. WebCop: Locating Neighborhoods of Malware on the Web , 2010, LEET.
[2] Niels Provos,et al. All Your iFRAMEs Point to Us , 2008, USENIX Security Symposium.
[3] Timothy W. Finin,et al. SVMs for the Blogosphere: Blog Identification and Splog Detection , 2006, AAAI Spring Symposium: Computational Approaches to Analyzing Weblogs.
[4] Minaxi Gupta,et al. Behind Phishing: An Examination of Phisher Modi Operandi , 2008, LEET.
[5] Lawrence K. Saul,et al. Beyond blacklists: learning to detect malicious web sites from suspicious URLs , 2009, KDD.
[6] Dan Gusfield,et al. Algorithms on Strings, Trees, and Sequences - Computer Science and Computational Biology , 1997 .
[7] Jose Nazario,et al. PhoneyC: A Virtual Client Honeypot , 2009, LEET.