[1] Moore T,Edelman B.Measuring the perpetrators and funders of typosquatting[A].Financial Cryptography and Data Security[C].New York:Springer Berlin Heidelberg,2010.175-191.
[2] Wang Y M,Beck D,Wang J,et al.Strider typo-patrol:discovery and analysis of systematic typo-squatting[A].Conference on Steps To Reducing Unwanted Traffic on the Internet[C].San Jose,CA:USENIX Association,2006.5.
[3] Vissers T,Joosen W,Nikiforakis N.Parking sensors:analyzing and detecting parked domains[A].The 2015 Network and Distributed System Security Symposium[C].San Diego,California:Internet Society,2015.53.
[4] Liu T,Zhang Y,Shi J,et al.Towards quantifying visual similarity of domain names for combating typosquatting abuse[A].2016 IEEE Military Communications Conference[C].Baltimore,MD,USA:IEEE,2016.770-775.
[5] Khan M T,Huo X,Li Z,et al.Every second counts:quantifying the negative externalities of cybercrime via typosquatting[J].Neural Computation,2015,6(5):135-150.
[6] Banerjee A,Barman D,Faloutsos M,et al.Cyber-fraud is one typo away[A].Proceedings of the 27th Conference on Computer Communications[C].Phoenix,AZ,USA:IEEE,2008.1939-1947.
[7] Banerjee A,Rahman M S,Faloutsos M.SUT:Quantifying and mitigating url typosquatting[J].Computer Networks,2011,55(13):3001-3014.
[8] Woodbridge J,Anderson H S,Ahuja A.Predicting Domain Generation Algorithms with Long Short-Term Memory Networks[DB/OL].https://arxiv.org/abs/1611.00791,2016-11-02.
[9] Anderson H S,Woodbridge J,Filar B.DeepDGA:adversarially-tuned domain generation and detection[A].Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security[C].New York,NY,USA:ACM,2016.13-21.
[10] 周昌令,栾兴龙,肖建国.基于深度学习的域名查询行为向量空间嵌入[J].通信学报,2016,37(3):165-174.
[11] Saxe J,Berlin K.eXpose:A Character-Level Convolutional Neural Network with Embeddings for Detecting Malicious URLs,File Paths and Registry Keys[DB/OL].https://arxiv.org/abs/1702.08568,2017-02-27.
[12] Kobojek P,Saeed K.Application of recurrent neural networks for user verification based on keystroke dynamics[J].Journal of Telecommunications and Information Technology,2016(3):80.
[13] Hochreiter S,Schmidhuber J.Long short-term memory[J].Neural Computation,1997,9(8):1735-1780.
[14] Manku G S,Jain A,Das Sarma A.Detecting near-duplicates for web crawling[A].Proceedings of the 16th International Conference on World Wide Web[C].Banff,Alberta,Canada:ACM,2007.141-150.
[15] Jing Y,Baluja S.Visualrank:Applying pagerank to large-scale image search[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2008,30(11):1877-1890.
[16] Slaney M,Casey M.Locality-sensitive hashing for finding nearest neighbors[lecture notes] [J].IEEE Signal Processing Magazine,2008,25(2):128-131. |