共 18 条
- [1] Alazab A., 2012, 2012 International Symposium on Communications and Information Technologies (ISCIT), P296, DOI 10.1109/ISCIT.2012.6380910
- [2] Alazab A., 2012, ICITA 2011, P1
- [3] Alazab A., 2013, SOCIAL NETWORK ENG S, P248
- [4] Alazab M., 2010, Proceedings Second Cybercrime and Trustworthy Computing Workshop (CTC 2010), P52, DOI 10.1109/CTC.2010.8
- [5] Alazab M., 2011, 7 INT C GLOB SEC SAF
- [6] Alazab M., 2012, GLOBAL SECURITY, P204
- [7] Barth A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P75
- [8] On the Analysis of the Zeus Botnet Crimeware Toolkit [J]. PST 2010: 2010 EIGHTH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2010, : 31 - 38
- [9] Caldwell Tracey, 2011, Network Security, V2011, P10, DOI 10.1016/S1353-4858(11)70075-7
- [10] Corporation T.M, 2010, COMMON VULNERABILITI