[1] |
PATEL K, DUBEY S K.To Recognize and Analyze Spam Domains from Spam Emails by Data Mining[C]//IEEE. 3rd International Conference on Computing for Sustainable Global Development, March 16-18, 2016, New Delhi, India. New Jersey: IEEE, 2016: 4030-4035.
|
[2] |
HUNT R, CARPINTER J.Current and New Developments in Spam Filtering[C]//IEEE. 14th IEEE International Conference on Networks, September 13-15, 2006, Singapore. New Jersey: IEEE, 2006: 1-6.
|
[3] |
WEST A G, AVIV A J, CHANG Jian, et al.Spam Mitigation Using Spatio-temporal Reputations from Blacklist History[C]//ACM. 26th Annual Computer Security Applications Conference, December 5-9, 2010, Orlando, Florida. New York: ACM, 2010: 161-170.
|
[4] |
MOURA G C M, SPEROTTO A, SADRE R, et al. Evaluating Third-party Bad Neighborhood Blacklists for Spam Detection[C]//IFIP, IEEE. 2013 IFIP/IEEE International Symposium on Integrated Network Management, May 27-31, 2013, Ghent, Belgium. New Jersey: IEEE, 2013: 252-259.
|
[5] |
HIJAWI W, FARIS H, ALQATAWNA J, et al.Improving Email Spam Detection Using Content Based Feature Engineering Approach[C]//IEEE. 2017 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies, October 11-13, 2017, Aqaba, Jordan. New Jersey: IEEE, 2017: 1-6.
|
[6] |
PATIL P, RANE R, BHALEKAR M. Detecting Spam and Phishing Mails Using SVM and Obfuscation URL Detection Algorithm[EB/OL]. , 2018-4-11.
|
[7] |
ALAZAB M, LAYTON R, BROADHURST R, et al.Malicious Spam Emails Developments and Authorship Attribution[C]//IEEE. 4th Cybercrime and Trustworthy Computing Workshop, November 21-22, 2013, Sydney NSW, Australia. New Jersey: IEEE, 2014: 58-68.
|
[8] |
SONGKHLA C N, PIROMSOPA K.Statistical Rules for Thai Spam Detection[C]//IEEE. 2nd International Conference on Future Networks, January 22-24, 2010, Sanya, Hainan, China. New Jersey: IEEE, 2010: 238-242.
|
[9] |
GARFINKEL T, Rosenblum M. A Virtual Machine Introspection Based Architecture for Intrusion Detection[EB/OL]. , 2018-4-12.
|
[10] |
ZHANG Jian, GAO Cheng, GONG Liangyi, et al.Research on Virtual Machine Introspection Technology[J]. Netinfo Security, 2017, 17(9): 63-68.
|
|
张健,高铖,宫良一,等. 虚拟机自省技术研究[J]. 信息网络安全,2017,17(9):63-68.
|
[11] |
DINABURG A, ROYAL P, SHARIF M, et al.Ether: Malware Analysis via Hardware Virtualization Extensions[C]//ACM. 15th ACM Conference on Computer and Communications Security, October 27-31, 2008, Alexandria, Virginia, USA. New York: ACM, 2008: 51-62.
|
[12] |
NIU Pengfei, ZHANG Jian, CHANG Qing, et al.Research and Design on Abnormal Behavior Online Detection Platform Based on Xen[J]. Netinfo Security, 2016, 16(9): 139-144.
|
|
牛鹏飞,张健,常青,等. 基于Xen的异常行为在线检测平台研究与设计[J]. 信息网络安全,2016,16(9):139-144.
|
[13] |
BINDU V, THOMAS C.Performance Evaluation of Classifiers for Spam Detection with Benchmark Datasets[C]//IEEE. 2016 International Conference on Data Mining and Advanced Computing, March 16-18, 2016, Ernakulam, India. New Jersey: IEEE, 2016: 17-22.
|