Author:
Du Kun,Yang Hao,Li Zhou,Duan Haixin,Hao Shuang,Liu Baojun,Ye Yuxiao,Liu Mingxuan,Su Xiaodong,Liu Guang,Geng Zhifeng,Zhang Zaifeng,Liang Jinjin
Publisher
Springer International Publishing
Reference47 articles.
1. What Is TLDR? (2017).
https://www.lifewire.com/what-is-tldr-2483633
2. How scammers use sub-domains (2016).
http://easykey.uk/computer-safety/how-scammers-use-sub-domains
3. Yang, H., et al.: How to learn klingon without a dictionary: detection and measurement of black keywords used by the underground economy. In: 2017 IEEE Symposium on Security and Privacy (SP). IEEE (2017)
4. Lecture Notes in Computer Science;S Marchal,2012
5. DOMAIN NAMES - IMPLEMENTATION AND SPECIFICATION (1987).
https://tools.ietf.org/html/rfc1035
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献