|
[1]Aldwairi, M. & Alsalman, R., “MALURLS: A Lightweight Malicious Website Classification Based on URL Features.” Journal of Emerging Technologies in Web Intelligence (JETWI) Vol. 4, pp. 128-133 (2012) [2]Anti-Phishing Working Group http://www.antiphishing.org (online) [3]AVAST https://www.avast.com/ (online) [4]Breiman, L., “Better Subset Regression Using the Nonnegative Garrote.” Technometrics No.37, pp. 373-384 (1995). [5]Bright Cloud https://www.brightcloud.com/ (online) [6]Chen, C. M., Huang, J. J., Ou, Y. H., “Efficient suspicious URL filtering based on reputation.” Journal of Information Security and Applications Vol. 20, pp. 26-36 (2015) [7]Choi, H., Zhu, B. B., and Lee, H., “Detecting Malicious Web Links and Identifying Their Attack Types.” WebApps'11 Proceedings of the 2nd USENIX conference on Web application development, pp. 11-11, Berkeley, USA (2011) [8]Cortes, C. & Vapnik V., “Support-vector networks.” Machine Learning No. 20, pp. 273-297 (1995). [9]Darling, M., Heileman, G., Gressel, G., Ashok, A., and Poornachandran, P., “A Lexical Approach for Classifying Malicious URLs.” High Performance Computing & Simulation (HPCS), Alexandria,USA, pp. 195-202 (2015). [10]DMOZ - The Directory of the Web. https://www.dmoz.org/ (online) [11]Egele, M., Kirda, E., and Kruegel, C., “Mitigating driveby download attacks: Challenges and open problems.” In Proceedings of Open Research Problems in Network Security Workshop (iNetSec 2009), Zurich, Switzerland (2009). [12]Fukushima, Y., Hori, Y., and Sakurai, K., “Proactive Blacklisting for Malicious Web Sites by Reputation Evaluation Based on Domain and IP Address Registration.” 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, pp. 352-361 (2011). [13]Guyon, I., & Elisseeff, A., "An introduction to variable and feature selection." Journal of machine learning research", pp. 1157-1182.(2003) [14]Kazemian, H. B. & Ahmed, S., “Comparisons of machine learning techniques for detecting malicious webpages.” Expert Systems with Applications, pp. 1166-1177 (2015). [15]Ma, J., Saul, L. K., Savage, S., and Voelker, G. M., “Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs.” In KDD '09 Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, New York, USA, pp. 1245-1254 (2009). [16]Malware - Clean MX. http://support.clean-mx.de/clean-mx/viruses.php (online) [17]Malware domain list https://www.malwaredomainlist.com/mdl.php (online) [18]MBA智库百科-網路爬蟲 http://wiki.mbalib.com/zh-tw/%E7%BD%91%E7%BB%9C%E7%88%AC%E8%99%AB (online) [19]McAfee https://www.mcafee.com/ (online) [20]McGrath, D. K. & Gupta, M., “Behind Phishing: An Examination of Phisher Modi Operandi.” In Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats (LEET), San Francisco, CA, (2008). [21]PhishTank http://www.phishtank.com/phish_archive.php (online) [22]Powers, D. M. W., “Evaluation: from precision, recall and f-measure to roc, informedness, markedness & correlation.” Journal of Machine Learning Technologies (2011). [23]Provos, N., McNamee, D., Mavrommatis, P., Wang, K., and Modadug, N., "The ghost in the browser analysis of web-based malware.” In: Proceedings of the first workshop on hot topics in understanding botnets, Cambridge (2007). [24]Salzberg, S., “On comparing classifiers: pitfalls to avoid and a recommended approach.” Data Mining and Knowledge Discovery, Boston, USA, pp. 317-328 (1997). [25]Saranya, C., Manikandan, G. “A study on normalization techniques for privacy preserving data mining.” International Journal of Engineering and Technology (IJET), pp. 2701-2704 (2013). [26]Security: https://sucuri.net/website-security/google-blacklisted-my-website (online) [27]Stehman, S. V., “Selecting and interpreting measures of thematic classification accuracy.” Remote sensing of Environment, pp. 77-89. (1997) [28]Thomas, K., Grier, C., Ma, J., Paxson, V., and Song, D., “Design and Evaluation of a Real-Time URL Spam Filtering Service.” 2011 IEEE Symposium on Security and Privacy, California, USA, pp. 447-462 (2011). [29]Tibshirani, R., “Regression Shrinkage and Selection via the lasso.” Journal of the Royal Statistical Society Vol.58, pp. 267-288 (1996). [30]TrendLabs 2016年資訊安全總評 http://www.trendmicro.tw/cloud-content/tw/pdfs/security-intelligence/reports/trendlabs_2016_annual_information_security_review.pdf (online) [31]Trend Web Reputation Policies http://docs.trendmicro.com/all/ent/officescan/v10.6/en-us/osce_10.6_olhsrv/ohelp/web/wreppo.htm [32]Web of Trust(WOT) https://www.mywot.com/ (online) [33]Xu, H., Caramanis, C., and Mannor, S., “Robust Regression and Lasso.” IEEE Transactions on Information Theory, pp. 3561-3574 (2010). [34]Zhou, Q., Song, S., Huang, G. and Wu, C., “Efficient Lasso training from a geometrical perspective.” Neurocomputing, Vol. 168, pp. 234-239 (2015).
|