共 14 条
- [1] [Anonymous], 2010, NDSS 10
- [2] [Anonymous], 2011, APWG PHISHING ACTIVI
- [3] Anvil, SEARCH ENG OPT WHIT
- [4] Basnet R., 2010, International Conference on Information Security and Artificial Intelligence (ISAI), P108
- [5] Basnet Ram B., 2011, Proceedings of the 2011 International Conference on Security & Management (SAM 2011), P624
- [6] Basnet R, 2008, STUD FUZZ SOFT COMP, V226, P373, DOI 10.1007/978-3-540-77465-5_19
- [7] Cova M, 2010, P 19 INT C WORLD WID, P281, DOI DOI 10.1145/1772690.1772720
- [8] Garera S, 2007, WORM'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON RECURRING MALCODE, P1
- [9] Hall M., 2009, SIGKDD Explorations, V11, P10, DOI DOI 10.1145/1656274.1656278
- [10] LECESSIE S, 1992, APPL STAT-J ROY ST C, V41, P191