Author:
Subasi Abdulhamit,Balfaqih Mohammed,Balfagih Zain,Alfawwaz Khaled
Reference19 articles.
1. Attacking malicious code: A report to the Infosec Research Council;McGraw;IEEE software,2000
2. Testing malware detectors;Christodorescu;ACM SIGSOFT Software Engineering Notes,2004
3. Ma, J., Saul, L.K., Savage, S., & Voelker, G.M. (2009, June). Identifying suspicious URLs: an application of large-scale online learning. In Proceedings of the 26th annual international conference on machine learning (pp. 681-688). ACM.
4. Malicious web content detection by machine learning;Hou;Expert Systems with Applications,2010
5. Garera, S., Provos, N., Chew, M., & Rubin, A.D. (2007, November). A framework for detection and measurement of phishing attacks. In Proceedings of the 2007 ACM workshop on Recurring malcode (pp. 1-8). ACM.
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献