1. M.
Akiyama T.
Yagi K.
Aoki T.
Hariu and
Y.
Kadobayashi
.
Active Credential Leakage for Observing Web-Based Attack Cycle. In S. J. Stolfo A. Stavrou and C. V. Wright editors Proceedings of the 16th International Symposium on Research in Attacks Intrusions and Defenses (RAID
2013
) Lecture Notes in Computer Science
(Volume 8145) pages
223
--
243 Rodney Bay 2013.
Springer
. 10.1007/978-3-642-41284-4_12 M. Akiyama T. Yagi K. Aoki T. Hariu and Y. Kadobayashi. Active Credential Leakage for Observing Web-Based Attack Cycle. In S. J. Stolfo A. Stavrou and C. V. Wright editors Proceedings of the 16th International Symposium on Research in Attacks Intrusions and Defenses (RAID 2013) Lecture Notes in Computer Science (Volume 8145) pages 223--243 Rodney Bay 2013. Springer. 10.1007/978-3-642-41284-4_12
2. Evaluation in the absence of absolute ground truth: toward reliable evaluation methodology for scan detectors
3. Clean MX. Realtime Database. Data feed available online in April 2016: http://support.clean-mx.de/clean-mx/viruses 2016. Clean MX. Realtime Database. Data feed available online in April 2016: http://support.clean-mx.de/clean-mx/viruses 2016.
4. G. Csárdi and T. Nepusz. The igraph Software Package for Complex Network Research. InterJournal Complex Systems CX.18. Available online in June 2014: http://www.interjournal.org/manuscript_abstract.php?361100992 2006. G. Csárdi and T. Nepusz. The igraph Software Package for Complex Network Research. InterJournal Complex Systems CX.18. Available online in June 2014: http://www.interjournal.org/manuscript_abstract.php?361100992 2006.
5. Quantifying the accuracy of the ground truth associated with Internet traffic traces