Proposal and Evaluation of Cyber Defense System Using Blacklist Refined Based on Authentication Results
暂无分享,去创建一个
Naoki Hayashi | Nobutaka Kawaguchi | Hiroaki Kikuchi | Yoshiaki Isobe | Yasuhiro Fujii | Tomohiro Shigemoto | Tetsuro Kito | Naoki Shimotsuma | Hirofumi Nakakoji
[1] Dwen-Ren Tsai,et al. A proxy-based real-time protection mechanism for social networking sites , 2010, 44th Annual 2010 IEEE International Carnahan Conference on Security Technology.
[2] Roberto Perdisci,et al. From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware , 2012, USENIX Security Symposium.
[3] Michele Colajanni,et al. Collaborative architecture for malware detection and analysis , 2008, SEC.