1. Kim, J., Yoo, D.H., Jang, H., Jeong, K.: WebSHArk 1.0: a benchmark collection for malicious web shell detection. J. Inf. Process. Syst. 11(2), 229–238 (2015)
2. Hannousse, A., Yahiouche, S.: Handling webshell attacks: a systematic mapping and survey. Comput. Secur. 108, 102366 (2021)
3. Web shell attacks continue to rise. https://www.microsoft.com/security/blog/2021/02/11/web-shell-attacks-continue-to-rise/. Accessed 10 Feb 2022
4. Li, T., Ren, C., Fu, Y., et al.: Webshell detection based on the word attention mechanism. IEEE Access 7, 185140–185147 (2019)
5. Tu, T.D., Guang, C., Xiaojun, et al.: Webshell detection techniques in web applications. In: Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT), pp. 1–7. IEEE (2014)