Author:
Shin Seungwon,Xu Zhaoyan,Gu Guofei
Subject
Computer Networks and Communications
Reference33 articles.
1. Leyla Bilge, Engin Kirda, Christopher Kruegel, Marco Balduzzi, Exposure: finding malicious domains using passive dns analysis, in: Proc. of NDSS, 2011.
2. J.C. Christopher-Burges, A tutorial on support vector machines for pattern recognition, Journals of the Data Mining and Knowledge Discovery 2, 1998 121–167.
3. Sam Burnett, Nick Feamster, Santosh Vempala, Chipping away at censorship firewalls with user-generated content, in: Proceedings of the 19th USENIX Conference on Security, USENIX Security’10, 2010.
4. Juan Caballero, Pongsin Poosankam, Christian Kreibich, Dawn Song, Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering, in: Proceedings of the 16th ACM Conference on Computer and Communication Security, November 2009.
5. Corinna Cortes, V. Vapnik. Support-Vector Networks, Mach. Learn. 20(3), 1995 273–297.
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献