1. Kim J , Yoo D H , Jang H , Web SHArk 1. 0 : a benchmark collection for malicious web shell detection . Journal of Information Processing Systems , 2015 , 11(2): 229 - 238 . Kim J, Yoo D H, Jang H, WebSHArk 1.0: a benchmark collection for malicious web shell detection. Journal of Information Processing Systems, 2015, 11(2): 229-238.
2. Yu B , Liu J W , Zhou Z. WADS : A Webshell Attack Defender Assisted by Software-Defined Networks//Information Security Practice and Experience: 16th International Conference , ISPEC 2021, Nanjing, China, December 17–19, 2021, Proceedings 16 . Springer International Publishing , 2021 : 209 - 222 . Yu B, Liu J W, Zhou Z. WADS: A Webshell Attack Defender Assisted by Software-Defined Networks//Information Security Practice and Experience: 16th International Conference, ISPEC 2021, Nanjing, China, December 17–19, 2021, Proceedings 16. Springer International Publishing, 2021: 209-222.
3. Deng , L.Y. , Lee , D.L. , Chen , Y.H. , Yann , L.X. : Lexical analysis for the webshell attacks . In: 2016 International Symposium on Computer, Consumer and Control (IS3C) , pp. 579– 582 . IEEE (2016) Deng, L.Y., Lee, D.L., Chen, Y.H., Yann, L.X.: Lexical analysis for the webshell attacks. In: 2016 International Symposium on Computer, Consumer and Control (IS3C), pp. 579–582. IEEE (2016)
4. Tu T D , Guang C , Xiaojun G , Webshell detection techniques in web applications//Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT) . IEEE , 2014 : 1-7. Tu T D, Guang C, Xiaojun G, Webshell detection techniques in web applications//Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT). IEEE, 2014: 1-7.
5. Pan Z , Chen Y , Chen Y , Webshell detection based on executable data characteristics of php code. Wireless communications and mobile computing , 2021 , 2021: 1-12. Pan Z, Chen Y, Chen Y, Webshell detection based on executable data characteristics of php code. Wireless communications and mobile computing, 2021, 2021: 1-12.