Identifying Risk Factors for Webserver Compromise
暂无分享,去创建一个
[1] Stefan Savage,et al. Cloak and dagger: dynamics of web search cloaking , 2011, CCS '11.
[2] Sam Ransbotham,et al. An Empirical Analysis of Exploitation Attempts Based on Vulnerabilities in Open Source Software , 2010, WEIS.
[3] Chris Kanich,et al. Taster's choice: a comparative analysis of spam feeds , 2012, Internet Measurement Conference.
[4] Christopher Krügel,et al. Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner , 2012, USENIX Security Symposium.
[5] Tyler Moore,et al. Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade , 2011, USENIX Security Symposium.
[6] Martin Lee,et al. WHO'S NEXT? IDENTIFYING RISK FACTORS FOR SUBJECTS OF TARGETED ATTACKS , 2012 .
[7] Tyler Moore,et al. The Economics of Information Security , 2006, Science.
[8] Bart Jacobs,et al. Increased security through open source , 2007, Commun. ACM.
[9] James J Schlesselman. Case-Control Studies: Design, Conduct, Analysis , 1982 .
[10] Vitaly Shmatikov,et al. Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011 , 2011, CCS.
[11] Wouter Joosen,et al. You are what you include: large-scale evaluation of remote javascript inclusions , 2012, CCS.
[12] Engin Kirda,et al. Quo Vadis? A Study of the Evolution of Input Validation Vulnerabilities in Web Applications , 2011, Financial Cryptography.
[13] Fang Yu,et al. Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures , 2013, 2013 IEEE Symposium on Security and Privacy.
[14] R. Doll,et al. Lung Cancer and Other Causes of Death in Relation to Smoking , 1956, British medical journal.
[15] T. Moore,et al. Pick your poison: pricing and inventories at unlicensed online pharmacies , 2013, EC '13.