Measurement Study on Malicious Web Servers in the .nz Domain
暂无分享,去创建一个
[1] Deborah A. Frincke,et al. Justifying the need for forensically ready protocols: A case study of identifying malicious web servers using client honeypots , 2008 .
[2] Stefan Frei,et al. Understanding the web browser threat: examination of vulnerable online web browser populations and the "insecurity iceberg" , 2008 .
[3] Rachel Greenstadt,et al. Reinterpreting the Disclosure Debate for Web Infections , 2008, WEIS.
[4] P. Komisarczuk,et al. Identification of Malicious Web Pages with Static Heuristics , 2008, 2008 Australasian Telecommunication Networks and Applications Conference.
[5] Ian Welch,et al. Technical report, Victoria University of Wellington , 2008 .
[6] Xuxian Jiang,et al. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities , 2006, NDSS.
[7] Chris Kanich,et al. Spamalytics: an empirical analysis of spam marketing conversion , 2009, CACM.
[8] Chengyu Song,et al. Studying Malicious Websites and the Underground Economy on the Chinese Web , 2008, WEIS.
[9] Niels Provos,et al. All Your iFRAMEs Point to Us , 2008, USENIX Security Symposium.
[10] C. Seifert. Know Your Enemy: Malicious Web Servers , 2007 .
[11] Deborah A. Frincke,et al. Drive-by-Downloads , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[12] Felix C. Freiling,et al. Measuring and Detecting Fast-Flux Service Networks , 2008, NDSS.
[13] Stefan Axelsson,et al. The base-rate fallacy and its implications for the difficulty of intrusion detection , 1999, CCS '99.
[14] Steven D. Gribble,et al. A Crawler-based Study of Spyware in the Web , 2006, NDSS.
[15] Team Cymru,et al. The Underground Economy: Priceless , 2006, login Usenix Mag..