参考文献
[1]张瀚珑,沈备军,王永剑.基于模板检测的违法网站识别方法[J].南京理工大学学报(自然科学版),2015,39(3):266-271.
[2]MA J,SAUL L K,SAVAGE S,et al.Beyond Blacklists:Learning to Detect Malicious Web Sites from Suspicious URLs[C]//Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.New York,USA:ACM Press,2009:1245-1254.
[3]MA J,SAUL L K,SAVAGE S,et al.Identifying Suspicious URLs:An Application of Large-scale Online Learning[C]//Proceedings of the 26th Annual Inter-national Conference on Machine Learning.New York,USA:ACM Press,2009:681-688.
[4]LUO Ping,LIN Fen,XIONG Yuhong,et al.Towards Combining Web Classification and Web Information Extrac;Ltion:A Case Study[C]//Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.New York,USA:ACM Press,2009:1235-1244.
[5]BANNUR S N,SAUL L K,SAVAGE S.Judging a Site by Its Content:Learning the Textual,Structural,and Visual Features of Malicious Web Pages[C]//Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence.New York,USA:ACM Press,2011:1-10.
[6]CANALI D,COVA M,VIGNA G,et al.Prophiler:A Fast Filter for the Large-scale Detection of Malicious Web Pages[C]//Proceedings of the 20th International Conference on World Wide Web.New York,USA:ACM Press,2011:197-206.
[7]ESHETE B,VILLAFIORITA A,WELDEMARIAM K.Binspect:Holistic Analysis and Detection of Malicious Web Pages[C]//Proceedings of International Conference on Security and Privacy in Communication Systems.Berlin,Germany:Springer,2012:149-166.
[8]ESHETE B,VENKATAKRISHNAN V N.Webwinnow:Leveraging Exploit Kit Workflows to Detect Malicious URLs[C]//Proceedings of the 4th ACM Conference on Data and Application Security and Privacy.New York,USA:ACM Press,2014:305-312.
[9]CHEN G,CHOI B.Web Page Genre Classification[C]//Proceedings of ACM Symposium on Applied Computing.New York,USA:ACM Press,2008:2353-2357.
[10]贾梦青,王宗敏,陈刚.基于用户 HTTP 行为分析的网站分类研究[J].计算机工程与设计,2010,31(3):491-494.
[11]王涛,余顺争.基于统计学习的挂马网页实时检测[J].计算机科学,2011,38(1):87-90,129.
[12]黄华军,钱亮,王耀钧.基于异常特征的钓鱼网站 URL检测技术[J].信息网络安全,2012(1):23-25,67.
[13]宋江春,沈钧毅.一种新的Web用户群体和URL聚类算法的研究[J].控制与决策,2007,22(3):284-288.
[14]李洋,刘飚,封化民.基于机器学习的网页恶意代码检测方法[J].北京电子科技学院学报,2012,20(4):36-40.
[15]倪平,陈正果,欧阳雄弈,等.Web 恶意代码主动检测与分析系统的设计与实现[J].计算机应用,2011,31(S2):106-108.
[16]JANG J,WOO J,YUN J,et al.Mal-netminer:Malware Classification Based on Social Network Analysis of Call Graph[C]//Proceedings of the 23rd International Con-ference on World Wide Web.New York,USA:ACM Press,2014:731-734.
[17]BILGE L,SEN S,BALZAROTTI D,et al.EXPOSURE:A Passive DNS Analysis Service to Detect and Report Malicious Domains[J].ACM Transactions on Infor-mation and System Security,2014,16(4):1-28.
[18]KOLBITSCH C,LIVSHITS B,ZORN B,et al.Rozzle:De-cloaking Internet Malware[C]//Proceedings of IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2012:443-457.
[19]BLONDEL V D,GUILLAUME J L,LAMBIOTTE R,et al.Fast Unfolding of Communities in Large Networks[J].Journal of Statistical Mechanics:Theory and Experiment,2008(10):155-168.
[20]URVOY T,CHAUVEAU E,FILOCHE P,et al.Tracking Web Spam with HTML Style Similarities[J].ACM Transactions on the Web,2008,2(1):1-28.
编辑顾逸斐 |