暂无分享,去创建一个
Yves Le Traon | Sylvain Gombault | Martin Monperrus | Mario Heiderich | Erwan Abgrall | Alain Ribault
[1] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[2] R. Lippmann,et al. Passive Operating System Identification From TCP / IP Packet Headers * , 2003 .
[3] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[4] Xin Huang,et al. Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications , 2009, DIMVA.
[5] Christopher Krügel,et al. Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks , 2009, DIMVA.
[6] Niels Provos,et al. A Virtual Honeypot Framework , 2004, USENIX Security Symposium.
[7] Jose Nazario,et al. PhoneyC: A Virtual Client Honeypot , 2009, LEET.
[8] Reza R. Adhami,et al. Fingerprinting for security , 2001 .
[9] Peter Eckersley,et al. How Unique Is Your Web Browser? , 2010, Privacy Enhancing Technologies.
[10] Lloyd G. Greenwald,et al. Toward Undetected Operating System Fingerprinting , 2007, WOOT.
[11] Christopher Krügel,et al. Dynamic Analysis of Malicious Code , 2006, Journal in Computer Virology.
[12] Ian Welch,et al. HoneyC - The low-interaction client honeypot , 2006 .
[13] Hovav Shacham,et al. Fingerprinting Information in JavaScript Implementations , 2011 .