共 50 条
- [1] Significant Factors for Detecting Malicious Redirections [J]. 2017 2ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATION AND NETWORKS (TEL-NET), 2017, : 499 - 502
- [2] A Method of Detecting a Malicious Actions using HTTP and FTP Protocols [J]. PROCEEDINGS OF THE 2017 INTELLIGENT SYSTEMS CONFERENCE (INTELLISYS), 2017, : 1083 - 1088
- [3] Detecting Malicious User Accounts Using Canvas Fingerprint [J]. 2017 8TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2017, : 358 - 361
- [4] Detecting Malicious Clients in ISP Networks Using HTTP Connectivity Graph and Flow Information [J]. 2014 PROCEEDINGS OF THE IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2014), 2014, : 150 - 157
- [5] Detecting malicious clients in ISP networks using HTTP connectivity graph and flow information [J]. HP Laboratories Technical Report, 2015, (29):
- [6] Detecting Malicious HTTP Requests Without Log Parser Using RequestBERT-BiLSTM [J]. INTELLIGENT SYSTEMS, PT II, 2022, 13654 : 328 - 342
- [7] A Comprehensive Evaluation of HTTP Header Features for Detecting Malicious Websites [J]. 2019 15TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2019), 2019, : 75 - 82
- [10] The Activity Analysis of Malicious HTTP-based Botnets using Degree of Periodic Repeatability [J]. SECTECH: 2008 INTERNATIONAL CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2008, : 83 - +