rush hour 2
This commit is contained in:
@@ -324,14 +324,6 @@
|
||||
howpublished={\url{http://scikit-learn.org/stable/modules/tree.html#tree-algorithms-id3-c4-5-c5-0-and-cart}}
|
||||
}
|
||||
|
||||
@misc{SciKitProbOnline,
|
||||
author={scikit-learn},
|
||||
title={{scikit-learn - Classification}},
|
||||
month=jan,
|
||||
year={2018},
|
||||
howpublished={\url{http://scikit-learn.org/stable/modules/tree.html#classification}}
|
||||
}
|
||||
|
||||
@misc{DENICOnline,
|
||||
author={DENIC e.G.},
|
||||
title={{DENIC}},
|
||||
@@ -348,6 +340,22 @@
|
||||
howpublished={\url{https://www.iana.org/assignments/dns-parameters/dns-parameters.xhtml}}
|
||||
}
|
||||
|
||||
@misc{WannaCryTwitterOnline,
|
||||
author={Darien Huss},
|
||||
title={{WannaCry propagation payload contains previously unregistered domain}},
|
||||
month=jan,
|
||||
year={2018},
|
||||
howpublished={\url{https://twitter.com/darienhuss/status/863083680528576512}}
|
||||
}
|
||||
|
||||
@misc{WhyDGOWinsOnline,
|
||||
author={LITAL ASHER-DOTAN},
|
||||
title={{THE FBI VS. GAMEOVER ZEUS: WHY THE DGA-BASED BOTNET WINS}},
|
||||
month=jan,
|
||||
year={2018},
|
||||
howpublished={\url{https://www.cybereason.com/blog/the-fbi-vs-gameover-zeus-why-the-dga-based-botnet-wins}}
|
||||
}
|
||||
|
||||
|
||||
@inproceedings{Stone-Gross:2009:YBM:1653662.1653738,
|
||||
author = {Stone-Gross, Brett and Cova, Marco and Cavallaro, Lorenzo and Gilbert, Bob and Szydlowski, Martin and Kemmerer, Richard and Kruegel, Christopher and Vigna, Giovanni},
|
||||
@@ -415,6 +423,15 @@ isbn="978-3-540-24668-8"
|
||||
address = {San Francisco, CA, USA},
|
||||
}
|
||||
|
||||
@ARTICLE{Friedman98additivelogistic,
|
||||
author = {Jerome Friedman and Trevor Hastie and Robert Tibshirani},
|
||||
title = {Additive Logistic Regression: a Statistical View of Boosting},
|
||||
journal = {Annals of Statistics},
|
||||
year = {1998},
|
||||
volume = {28},
|
||||
pages = {2000}
|
||||
}
|
||||
|
||||
@Article{Lim2000,
|
||||
author="Lim, Tjen-Sien
|
||||
and Loh, Wei-Yin
|
||||
@@ -457,6 +474,19 @@ url="https://doi.org/10.1023/A:1007608224229"
|
||||
keywords = {DNS black lists, Zipf-like distribution, spam traffic},
|
||||
}
|
||||
|
||||
@INPROCEEDINGS{6151979,
|
||||
author={P. J. Nero and B. Wardman and H. Copes and G. Warner},
|
||||
booktitle={2011 eCrime Researchers Summit},
|
||||
title={Phishing: Crime that pays},
|
||||
year={2011},
|
||||
volume={},
|
||||
number={},
|
||||
pages={1-10},
|
||||
keywords={computer crime;computer forensics;financial data processing;unsolicited e-mail;cybercriminal;e-mail phishing;financial institution;forensic evidence;malicious Web site;phishing Web sites;Companies;Data mining;Education;Electronic mail;Interviews;Law enforcement;Security;Investigations;Justice Science;Phishing},
|
||||
doi={10.1109/eCrime.2011.6151979},
|
||||
ISSN={2159-1237},
|
||||
month={Nov},}
|
||||
|
||||
@inproceedings{ramachandran2006can,
|
||||
title={Can DNS-based blacklists keep up with bots?},
|
||||
author={Ramachandran, Anirudh and Dagon, David and Feamster, Nick},
|
||||
|
||||
Reference in New Issue
Block a user