[1]Ma J, Saul L K, Savage S, et al. Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs[C]//Proc. of the 15th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. Paris, France: [s. n.], 2009: 1245-1254. [2]Ma J, Saul L K, Savage S, et al. Identifying Suspicious URLs: An Application of Large-scale Online Learning[C]//Proc. of International Conference on Machine Learning. Quebec, Canada: [s. n.], 2009: 681-688. [3]Blum A, Wardman B, Solorio T. Lexical Feature Based Phishing URL Detection Using Online Learning[C]//Proc. of the 3rd ACM Workshop on Artificial Intelligence and Security. Chicago, USA: [s. n.], 2010: 54-60. [4]Bilge L, Kirda E, Kruegel C, et al. EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis[C]//Proc. of the 18th Annual Network & Distributed System Security Symposium. California, USA: [s. n.], 2011: 1-17. [5]He Yuanchen, Zhong Zhenyu, Krasser S, et al. Mining DNS for Malicious Domain Registrations[C]//Proc. of the 6th International Conference on Collaborative Computing. Chicago, USA: [s. n.], 2010: 1-6. [6]Cortes C, Vapnik V. Support Vector Networks[J]. Machine Learning, 1995, 20(3): 273-297. [7]朱应武, 杨家海, 张金祥. 基于流量信息结构的异常检测[J]. 软件学报, 2010, 21(10): 2573-2583. [8]李昆仑, 黄厚宽, 田盛丰等. 模糊多类支持向量机及其在入侵检测中的应用[J]. 计算机学报, 2010, 28(2): 274-280. [9]Liu Bing. Web Data Mining Exploring Hyperlinks, Contents and Usage Data[M]. New York, USA: Springer, 2006: 96-108. [10]Wong Pakkwong, Chan Chorkin. Chinese Word Segmentation Based on Maximum Matching and Word Binding Force[C]//Proc. of the 16th Conference on Computational Linguistics. Copenhagen, Denmark: [s. n.], 1996: 200-203. [11]Fan Rongen, Chang Kaiwei, Hsieh C J, et al. LIBLINEAR: A Library for Large Linear Classification[J]. Journal of Machine Learning Research, 2008, 1(9): 1871-1874.
|