1. Jinsuk Kim, Dong HoonYoo, Heejin Jang, and KimoonJeong. 2015. Webshark 1.0: a benchmark collection for malicious web shell detection. Journal of Information Processing Systems 11, 2 (2015), 229--238.
2. OleksiiStarov, Johannes Dahse, Syed Sharique Ahmad, Thorsten Holz, and Nick Nikiforakis. 2016. No honor among thieves: a large-scale analysis of malicious web shells. In International Conference on World Wide Web. 1021--1032.
3. Rung Ching Chen and Su Ping Chen. 2008. Intrusion detection using a hybrid support vector machine based on entropy and TF-IDF. International Journal of Innovative Computing Information & Control 4, 2 (2008), 413--424.
4. Armand Joulin, Edouard Grave, PiotrBojanowski, and Tomas Mikolov. 2016. Bag of tricks for effcient text classification. CoRR abs/1607.01759 (2016).
5. Sergio Pastrana, Carmen Torrano-Gimenez, Than Nguyen Hai, and Agustin Orfila. 2015. Anomalous web payload detection: evaluating the resilience of 1-grams based classifiers. Springer International Publishing. 195--200.