1 |
B. Endicott-popovsky, J. Narvaez, C. Seifert, D. A. Frincke, L. R. O'Neil, and C. Aval, "Use of deception to improve client honeypot detection of drive-by-download attacks," Proc. of the 5th Inter-national Conference on Foundations of Augmented Cognition (FAC), 2009.
|
2 |
M. Cova, C. Kruegel, G. Vigna, "Detection and Analysis of Drive-by-Download Attacks and Malicious JavaScript Code", IW3C2, Apr. 2010.
|
3 |
M. Egele, P. Wurzinger, C. Kruegel and E. Kirda, "Defending browsers against drive-by downloads: Mitigating heap spraying code injection attacks," 2009. Available from http://www.iseclab.org/papers/ driveby.pdf; accessed on 15 May. 2010.
|
4 |
KrCERT, "Monthly Report: Internet Incident Trends and Analysis", Mar. 2009.
|
5 |
H. Kim, D. Kim, S. Cho, M. Park, M. Park, "An efficient visitation algorithm to improve the detection speed of high-ineraction client honeypots" RACS 2011, Nev. 2-5, 2011.
|
6 |
C. Seifert, P. Komisarczuk, and I. Welch, "True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots", SECUREWARE, 2009.
|
7 |
Janaka Deepakumara, Howard Heys and R. Venkatesan, "FPGA Implementation of MD5 Hash Algorithm", Canadian Conference on Electrical and Computer Engineering, Vol.2, pp.13-16, May. 2001.
|
8 |
Diez J. M., et al., "Hash Algorithm for Cryptographic Protocols: FPGA Implementations", 10th TELFOR' 2002, Nov. 2002.
|
9 |
Hayes, A. F., "Statistical methods for communication science", 2005
|
10 |
Gravetter, F. J., & Wallnau, L B."Statistics for the behavioral sciences 8th ed.", 2008.
|