[1]EMARKETER. Social media [EB/OL]. [2013-01-24] https://www.emarketer.com/Coverage/SocialMedia.aspx.
[2]Symantec.诺顿2012网络安全报告[R/OL].[2013-01-30].http://wenku.it168.com/d_000529769.shtml.
[3]HASIB A A. Threats of online social networks [J]. IJCSNS International Journal of Computer Science and Network Security, 2009, 9(11): 288-293.
[4]LIVSHITS V B, CUI W. Spectator: detection and containment of JavaScript worms[C]// ATC 2008: Proceedings of the USENIX 2008 Annual Technical Conference on Annual Technical Conference. Berkeley: USENIX Association, 2008: 335-348.
[5]CAO Y, YEGNESWARAN V, POSSAS P, et al. PathCutter: severing the self-propagation path of XSS JavaScript worms in social Web networks[EB/OL].[2013-10-10]. http://www.dnssec-test-dyn.com/sites/default/files/08_2.pdf.
[6]TER LOUW M, VENKATAKRISHNAN V N. Blueprint: robust prevention of cross-site scripting attacks for existing browsers[C]// Proceedings of the 2009 30th IEEE Symposium on Security and Privacy. Piscataway: IEEE Press, 2009: 331-346.
[7]LIKARISH P, JUNG E, JO I. Obfuscated malicious JavaScript detection using classification techniques[C]// Proceedings of the 2009 4th International Conference on Malicious and Unwanted Software. Piscataway: IEEE Press, 2009: 47-54.
[8]NUNAN A E, SOUTO E, dos SANTOS E M, et al. Automatic classification of cross-site scripting in Web pages using document-based and URL-based features[C]// Proceedings of the 2012 IEEE Symposium on Computers and Communications. Piscataway: IEEE Press, 2012: 702-707.
[9]LI W-J, WANG K, STOLFO S J, et al. Fileprints: identifying file types by n-gram analysis[C]// IAW 2005: Proceedings of the 6th Annual IEEE Systems, Man, and Cybernetics. Piscataway: IEEE Press, 2005: 64-71.
[10]LANZI A, BALZAROTTI D, KRUEGEL C, et al. AccessMiner: using system-centric models for malware protection[C]// Proceedings of the 17th ACM Conference on Computer and Communications Security. New York: ACM Press, 2010: 399-412.
[11]KIM B I, IM C T, JUNG H C. Suspicious malicious Web site detection with strength analysis of a JavaScript obfuscation[J]. International Journal of Advanced Science and Technology, 2011, 26:19-32.
[12]XU W, ZHANG F, ZHU S. Toward worm detection in online social networks[C]// Proceedings of the 26th Annual Computer Security Applications Conference. New York: ACM Press, 2010: 11-20.
[13]FAGHANI M R, SAIDI H. Malware propagation in online social networks[C]// Proceedings of the 2009 4th International Conference on Malicious and Unwanted Software. Piscataway: IEEE Press, 2009: 8-14.
[14]FAGHANI M R, SAIDI H. Social networks' XSS worms[C]// CSE 2009: Proceedings of the 2009 International Conference on Computational Science and Engineering. Piscataway: IEEE Press, 2009, 4: 1137-1141.
[15]FREUND Y, MASON L. The alternating decision tree learning algorithm[C]// ICML 1999: Proceedings of the 16th International Conference on Machine Learning. San Francisco: Morgan Kaufmann Publishers, 1999: 124-133.
[16]SAMY. I'm popular [EB/OL]. [2013-06-10] http://namb.la/popular/ |