1. [1] Chiba, D., Tobe, K., Mori, T. and Goto, S.: Detecting Malicious Websites by Learning IP Address Features, Proc. IEEE/IPSJ 12th International Symposium on Applications and the Internet (SAINT 2012), pp.29-39 (2012).
2. [2] Rajab, M.A., Ballard, L., Jagpal, N., Mavrommatis, P., Nojiri, D., Provos, N. and Schmidt, L.: Trends in Circumventing Web-Malware Detection, Google Technical Report (2011).
3. [3] Akiyama, M., Iwamura, M., Kawakoya, Y., Aoki, K. and Itoh, M.: Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks, IEICE Trans., Vol.E93.B, No.5, pp.1131-1139 (2010).
4. [4] Vaknin, S.: How to Avoid, Remove Facebook Malware (online), available from <http://howto.cnet.com/8301-11310_39-20070931-285/how-to-avoid-remove-facebook-malware/> (accessed 2011-07-01).
5. [5] Levine, J.: DNS Blacklists and Whitelists, RFC 5782 (2010).