rush hour 2

This commit is contained in:
2018-01-30 20:54:29 +01:00
parent ece9b4afcf
commit 95d35f2470
20 changed files with 171 additions and 146 deletions

View File

@@ -324,14 +324,6 @@
howpublished={\url{http://scikit-learn.org/stable/modules/tree.html#tree-algorithms-id3-c4-5-c5-0-and-cart}}
}
@misc{SciKitProbOnline,
author={scikit-learn},
title={{scikit-learn - Classification}},
month=jan,
year={2018},
howpublished={\url{http://scikit-learn.org/stable/modules/tree.html#classification}}
}
@misc{DENICOnline,
author={DENIC e.G.},
title={{DENIC}},
@@ -348,6 +340,22 @@
howpublished={\url{https://www.iana.org/assignments/dns-parameters/dns-parameters.xhtml}}
}
@misc{WannaCryTwitterOnline,
author={Darien Huss},
title={{WannaCry propagation payload contains previously unregistered domain}},
month=jan,
year={2018},
howpublished={\url{https://twitter.com/darienhuss/status/863083680528576512}}
}
@misc{WhyDGOWinsOnline,
author={LITAL ASHER-DOTAN},
title={{THE FBI VS. GAMEOVER ZEUS: WHY THE DGA-BASED BOTNET WINS}},
month=jan,
year={2018},
howpublished={\url{https://www.cybereason.com/blog/the-fbi-vs-gameover-zeus-why-the-dga-based-botnet-wins}}
}
@inproceedings{Stone-Gross:2009:YBM:1653662.1653738,
author = {Stone-Gross, Brett and Cova, Marco and Cavallaro, Lorenzo and Gilbert, Bob and Szydlowski, Martin and Kemmerer, Richard and Kruegel, Christopher and Vigna, Giovanni},
@@ -415,6 +423,15 @@ isbn="978-3-540-24668-8"
address = {San Francisco, CA, USA},
}
@ARTICLE{Friedman98additivelogistic,
author = {Jerome Friedman and Trevor Hastie and Robert Tibshirani},
title = {Additive Logistic Regression: a Statistical View of Boosting},
journal = {Annals of Statistics},
year = {1998},
volume = {28},
pages = {2000}
}
@Article{Lim2000,
author="Lim, Tjen-Sien
and Loh, Wei-Yin
@@ -457,6 +474,19 @@ url="https://doi.org/10.1023/A:1007608224229"
keywords = {DNS black lists, Zipf-like distribution, spam traffic},
}
@INPROCEEDINGS{6151979,
author={P. J. Nero and B. Wardman and H. Copes and G. Warner},
booktitle={2011 eCrime Researchers Summit},
title={Phishing: Crime that pays},
year={2011},
volume={},
number={},
pages={1-10},
keywords={computer crime;computer forensics;financial data processing;unsolicited e-mail;cybercriminal;e-mail phishing;financial institution;forensic evidence;malicious Web site;phishing Web sites;Companies;Data mining;Education;Electronic mail;Interviews;Law enforcement;Security;Investigations;Justice Science;Phishing},
doi={10.1109/eCrime.2011.6151979},
ISSN={2159-1237},
month={Nov},}
@inproceedings{ramachandran2006can,
title={Can DNS-based blacklists keep up with bots?},
author={Ramachandran, Anirudh and Dagon, David and Feamster, Nick},