共 42 条
[1]
Akamai, 2018, Akamai's Bot Manager-Advanced Strategies to Flexibly Manage the Long-term Business and IT Impact of Bots
[2]
Akrout I, 2019, Arxiv, DOI arXiv:1903.01003
[3]
Alam S, 2014, 2014 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), P2955, DOI 10.1109/CEC.2014.6900644
[4]
AlNoamany Y, 2013, ACM-IEEE J CONF DIG, P339
[5]
Web Runner 2049: Evaluating Third-Party Anti-bot Services
[J].
DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2020,
2020, 12223
:135-159
[6]
Analysis and Detection of Bogus Behavior in Web Crawler Measurement
[J].
2ND INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND QUANTITATIVE MANAGEMENT, ITQM 2014,
2014, 31
:1084-1091
[7]
Bhargav A, 2014, 2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), P632, DOI 10.1109/ICCICCT.2014.6993038
[8]
Bianco D., 2013, The Pyramid of Pain
[9]
Bock Kevin, 2017, 11 USENIX WORKSHOP O
[10]
Wrist in motion: A seamless context-aware continuous authentication framework using your clickings and typings
[J].
IEEE Transactions on Biometrics, Behavior, and Identity Science,
2020, 2 (03)
:294-307