1. [1] N. Provos, P. Mavrommatis, M.A. Rajab, and F. Monrose, “All your iFRAMEs point to us, ” 17th USENIX Security Symposium, 2008.
2. [2] M. Akiyama, Y. Kawakoya, M. Iwamura, K. Aoki, and M. Itoh, “MARIONETTE: Client honeypot for investigating and understanding Web-based malware infection on implicated websites, ” Joint Workshop on Information Security, 2009.
3. [3] Symantec, “Mpack, packed full of badness.” http://www.symantec.com/enterprise/security_response/weblog/2007/05/mpack_packed_full_of_badness.html
4. [4] MDSN Data Developer Center, “Mdac.” http://msdn.microsoft.com/en-us/data/aa937729.aspx
5. [5] C. Seifert, I. Welch, and P. Komisarczuk, “HoneyC-The Low-Interaction Client Honeypot, ” NZCSRCS, (Hamilton, 2007), Available from http://www.mcs.vuw.ac.nz/cseifert/blog/images/seifert-honeyc.pdf; accessed on, vol.10, 2006.