共 13 条
[1]
[Anonymous], 2011, NDSS
[2]
[Anonymous], 2010, P 5 INT S INF COMP C, DOI DOI 10.1145/1755688.1755702
[3]
[Anonymous], 2008, P 15 ANN NETW DISTR
[4]
Ashley D., 2011, TECHNICAL REPORT
[5]
Campbell S., 2011, Conferences in Research and Practice in Information Technology Series, V116, P57
[6]
Hsu CH, 2010, LECT NOTES COMPUT SC, V6307, P464, DOI 10.1007/978-3-642-15512-3_24
[7]
Lu C., 2011, P ACM WORKSH CYB SEC
[8]
Nazario J, 2008, MALWARE 2008: PROCEEDINGS OF THE 2008 3RD INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE, P29
[9]
Passerini E, 2008, LECT NOTES COMPUT SC, V5137, P186, DOI 10.1007/978-3-540-70542-0_10
[10]
Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces
[J].
25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE,
2009,
:311-+