Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search
暂无分享,去创建一个
Hai-Xin Duan | Raheem A. Beyah | Hao Yang | Kun Du | Jianjun Chen | XiaoFeng Wang | Luyi Xing | Xiaojing Liao | Zhongyu Pei | Eihal Alowaisheq | Sumayah A. Alrwais | Kan Yuan | Xiaofeng Wang | R. Beyah | Haixin Duan | Luyi Xing | Xiaojing Liao | Jianjun Chen | Hao Yang | Zhongyu Pei | Kan Yuan | Kun Du | Eihal Alowaisheq
[1] Tyler Moore,et al. Fashion crimes: trending-term exploitation on the web , 2011, CCS '11.
[2] Lawrence K. Saul,et al. Knock it off: profiling the online storefronts of counterfeit merchandise , 2014, KDD.
[3] Zhou Li,et al. Hunting the Red Fox Online: Understanding and Detection of Mass Redirect-Script Injections , 2014, 2014 IEEE Symposium on Security and Privacy.
[4] Paolo Milani Comparetti,et al. EvilSeed: A Guided Approach to Finding Malicious Web Pages , 2012, 2012 IEEE Symposium on Security and Privacy.
[5] Helmut Schmidt,et al. Probabilistic part-of-speech tagging using decision trees , 1994 .
[6] Roger Garside,et al. A hybrid grammatical tagger: CLAWS4 , 1997 .
[7] Информатика. Public Suffix List , 2010 .
[8] Tyler Moore,et al. Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade , 2011, USENIX Security Symposium.
[9] Nianwen Xu,et al. Chinese Word Segmentation as Character Tagging , 2003, Int. J. Comput. Linguistics Chin. Lang. Process..
[10] Geoffrey Leech,et al. Corpus Annotation: Linguistic Information from Computer Text Corpora , 1997 .
[11] Christopher Krügel,et al. Meerkat: Detecting Website Defacements through Image-based Object Recognition , 2015, USENIX Security Symposium.
[12] Nicolas Christin,et al. Automatically Detecting Vulnerable Websites Before They Turn Malicious , 2014, USENIX Security Symposium.
[13] Lawrence K. Saul,et al. Search + Seizure: The Effectiveness of Interventions on SEO Campaigns , 2014, Internet Measurement Conference.
[14] Stefan Savage,et al. Juice: A Longitudinal Study of an SEO Botnet , 2013, NDSS.
[15] Tyler Moore,et al. A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning , 2014, CCS.
[16] Oliver Hinz,et al. An analysis of the importance of the long tail in search engine marketing , 2010, Electron. Commer. Res. Appl..
[17] Christopher Krügel,et al. Delta: automatic identification of unknown web-based infection campaigns , 2013, CCS.
[18] Dan Klein,et al. Feature-Rich Part-of-Speech Tagging with a Cyclic Dependency Network , 2003, NAACL.
[19] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[20] Gianluca Stringhini,et al. Shady paths: leveraging surfing crowds to detect malicious web pages , 2013, CCS.