-
2
-
-
84873447654
-
Prophilcr: A fast filter for the large-scale detection of malicious web pages
-
ACM
-
D. Canali, M. Cova, G. Vigna, and C. Kruegel. Prophilcr: a fast filter for the large-scale detection of malicious web pages. In WWW'11, pages 197-206. ACM, 2011.
-
(2011)
WWW'11
, pp. 197-206
-
-
Canali, D.1
Cova, M.2
Vigna, G.3
Kruegel, C.4
-
3
-
-
79956002283
-
WebPatrol: Automated collection and replay of web-bascd malware scenarios
-
K. Z. Chen, G. Gu, J. Nazario, X. Han, and J. Zhuge. WebPatrol: Automated collection and replay of web-bascd malware scenarios. In ASIACCS' 11, pages 186-195, 2011.
-
(2011)
ASIACCS' 11
, pp. 186-195
-
-
Chen, K.Z.1
Gu, G.2
Nazario, J.3
Han, X.4
Zhuge, J.5
-
4
-
-
84874521918
-
Detecting malicious web links and identifying their attack types
-
H. Choi, B. B. Zhu, and H. Lee. Detecting malicious web links and identifying their attack types. In WebApps '11, pages 11-11, 2011.
-
(2011)
WebApps '11
, pp. 11-11
-
-
Choi, H.1
Zhu, B.B.2
Lee, H.3
-
6
-
-
77954566293
-
Detection and analysis of drive-by-download attacks and malicious javascript code
-
M. Cova, C. Kruegel, and G. Vigna. Detection and analysis of drive-by-download attacks and malicious javascript code. In WWW'10, pages 281-290, 2010.
-
(2010)
WWW'10
, pp. 281-290
-
-
Cova, M.1
Kruegel, C.2
Vigna, G.3
-
9
-
-
77954717029
-
Adsandbox: Sandboxing javascript to fight malicious websites
-
A. Dewald, T. Holz, and F. C. Freiling. Adsandbox: Sandboxing javascript to fight malicious websites. In SAC'10, pages 1859-1864, 2010.
-
(2010)
SAC'10
, pp. 1859-1864
-
-
Dewald, A.1
Holz, T.2
Freiling, F.C.3
-
10
-
-
77954525433
-
Caffeine Monkey: Automated collection, detection and analysis of malicious javascript
-
B. Feinstein and D. Peck. Caffeine Monkey: Automated collection, detection and analysis of malicious javascript. In Black Hat '07, 2007.
-
(2007)
Black Hat '07
-
-
Feinstein, B.1
Peck, D.2
-
11
-
-
77952338717
-
A framework for detection and measurement of phishing attacks
-
S. Garcra, N. Provos, M. Chew, and A. D. Rubin. A framework for detection and measurement of phishing attacks. In WORM'07, pages 1-8, 2007.
-
(2007)
WORM'07
, pp. 1-8
-
-
Garcra, S.1
Provos, N.2
Chew, M.3
Rubin, A.D.4
-
12
-
-
76749092270
-
The weka data mining software: An update
-
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten. The weka data mining software: an update. SIGKDD Explor. News!., pages 10-18, 2009.
-
(2009)
SIGKDD Explor. News!
, pp. 10-18
-
-
Hall, M.1
Frank, E.2
Holmes, G.3
Pfahringer, B.4
Reutemann, P.5
Witten, I.H.6
-
14
-
-
70349437016
-
Malieious web eontent detection by machine learning
-
January
-
Y.-T. Hou, Y. Chang, T. Chen, C.-S. Laih, and C.-M. Chen. Malieious web eontent detection by machine learning. Expert Syst. Appl., pages 55-60, January 2010.
-
(2010)
Expert Syst. Appl.
, pp. 55-60
-
-
Hou, Y.-T.1
Chang, Y.2
Chen, T.3
Laih, C.-S.4
Chen, C.-M.5
-
23
-
-
0000468432
-
Estimating continuous distributions in bayesian classifiers
-
G. H. John and P. Langley. Estimating continuous distributions in Bayesian classifiers. UAI, pages 338-345, 1995.
-
(1995)
UAI
, pp. 338-345
-
-
John, G.H.1
Langley, P.2
-
24
-
-
83755215609
-
Escape from monkey island: Evading high-interaction honeyclients
-
A. Kapravelos, M. Cova, C. Kruegel, and G. Vigna. Escape from monkey island: Evading high-interaction honeyclients. In DIMVA'11, 2011.
-
(2011)
DIMVA'11
-
-
Kapravelos, A.1
Cova, M.2
Kruegel, C.3
Vigna, G.4
-
26
-
-
70350630557
-
Beyond blacklists: Learning to detect malicious web sites from suspicious urls
-
J. Ma, L. K. Saul, S. Savage, and G. M. Voelker. Beyond blacklists: Learning to detect malicious web sites from suspicious urls. In KDD'09, pages 1245-1254, 2009.
-
(2009)
KDD'09
, pp. 1245-1254
-
-
Ma, J.1
Saul, L.K.2
Savage, S.3
Voelker, G.M.4
-
27
-
-
84857273448
-
IceShicld: Detection and mitigation of malicious websites with a frozen DOM
-
T. F. Mario Heiderich and T. Holz. IceShicld: Detection and mitigation of malicious websites with a frozen DOM. In RAID'11, pages 281-300, 2011.
-
(2011)
RAID'11
, pp. 281-300
-
-
Mario Heiderich, T.F.1
Holz, T.2
-
28
-
-
85084094793
-
PhoneyC: A virtual client honeypot
-
J. Nazario. PhoneyC: a virtual client honeypot. In LEET'09, 2009.
-
(2009)
LEET'09
-
-
Nazario, J.1
-
29
-
-
84893520306
-
A quantitative study of forum spamming using contcxtbased analysis
-
Y. Niu, Y. min Wang, H. Chen, M. Ma, and F. Hsu. A quantitative study of forum spamming using contcxtbased analysis. In NDSS'07, 2007.
-
(2007)
NDSS'07
-
-
Niu, Y.1
Wang, Y.M.2
Chen, H.3
Ma, M.4
Hsu, F.5
-
31
-
-
0003120218
-
Fast training of support vector machines using sequential minimal optimization
-
MIT Press
-
J. C. Piatt. Fast training of support vector machines using sequential minimal optimization. In Advances in Kernel Methods, pages 185-208. MIT Press, 1999.
-
(1999)
Advances in Kernel Methods
, pp. 185-208
-
-
Piatt, J.C.1
-
33
-
-
85089726744
-
On network-level clusters for spam detection
-
Z. Qian, Z. M. Mao, Y. Xie, and F. Yu. On network-level clusters for spam detection. In NDSS'10, 2010.
-
(2010)
NDSS'10
-
-
Qian, Z.1
Mao, Z.M.2
Xie, Y.3
Yu, F.4
-
35
-
-
84860775300
-
Trends in circumventing web-malware detection
-
M. Rajab, L. Ballard, N. Jagpal, P. Mavrommatis, D. Nojiri, N. Provos, and L. Schmidt. Trends in circumventing web-malware detection. Technical report, Google, 2011.
-
(2011)
Technical Report, Google
-
-
Rajab, M.1
Ballard, L.2
Jagpal, N.3
Mavrommatis, P.4
Nojiri, D.5
Provos, N.6
Schmidt, L.7
-
36
-
-
78751553658
-
Cujo: Efficient detection and prevention of drive-by-download attacks
-
K. Rieek. T. Krueger, and A. Dewald. Cujo: efficient detection and prevention of drive-by-download attacks. In ACSAC'10, pages 31-39, 2010.
-
(2010)
ACSAC'10
, pp. 31-39
-
-
Rieek, K.1
Krueger, T.2
Dewald, A.3
-
38
-
-
80051985554
-
Design and evaluation of a real-tune url spam filtering service
-
K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song. Design and evaluation of a real-tune url spam filtering service. In S&P'Jly 2011.
-
(2011)
S&P'Jly
-
-
Thomas, K.1
Grier, C.2
Ma, J.3
Paxson, V.4
Song, D.5
-
39
-
-
84904088330
-
Automated web patrol with stridcr honeymonkcys: Finding web sites that exploit browser vulnerabilities
-
Y.-M. Wang, D. Beck, X. Jiang, and R. Roussev. Automated web patrol with stridcr honeymonkcys: Finding web sites that exploit browser vulnerabilities. In NDSS'06, 2006.
-
(2006)
NDSS'06
-
-
Wang, Y.-M.1
Beck, D.2
Jiang, X.3
Roussev, R.4
-
40
-
-
85006397404
-
Large-scale automatic classification of plushmg pages
-
C. Whittaker, B. Ryner, and M. Nazif. Large-scale automatic classification of plushmg pages. In NDSS'JO, 2010.
-
(2010)
NDSS'JO
-
-
Whittaker, C.1
Ryner, B.2
Nazif, M.3
-
41
-
-
84869441116
-
ARROW: Generating signatures to detect drive-by downloads
-
J. Zhang, C. Seifert, J. W. Stokes, and W. Lee. ARROW: Generating signatures to detect drive-by downloads. In WWW'17, pages 187-196, 2011.
-
(2011)
WWW'17
, pp. 187-196
-
-
Zhang, J.1
Seifert, C.2
Stokes, J.W.3
Lee, W.4
|