共 6 条
[3]
On the analysis of the Zeus botnet crimeware toolkit. Binsalleeh H,Ormerod T,Boukhtouta A,Sinha P,Youssef A,Debbabi M,Wang L. Proc.of the8th Annual Int’’l Conf.on Privacy Security and Trust(PST2010) . 2010
[4]
An inquiry into the na-ture and causes of the wealth of Internet miscreants. FRANKLIN J,PAXSON V,PERRIG A,et al. Proc of the 14th ACM Conference on Computer and Communications Security . 2007
[5]
An empirical analysis of phishing blacklists. Sheng S,Wardman B,Warner G,Cranor LF,Hong J,Zhang CS. Proc.of the6th CEAS . 2009
[6]
botnet detection by monitoring group activities in DNS traffic. Choi H,Lee H,Lee H, et al. 7th IEEE International Conference on Computer and Information Technology . 2007