-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathbibliography.bib
91 lines (69 loc) · 5.03 KB
/
bibliography.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
@online{w3techs,
author = {W3Techs},
title = {Usage statistics of Default protocol https for websites},
year = {2023},
url = {https://w3techs.com/technologies/details/ce-httpsdefault},
urldate = {2023-02-01}
}
@online{ransomware,
author = {Steve Morgan},
title = {Global Ransomware Damage Costs Predicted To Reach $20 Billion (USD) By 2021},
year = {2019},
url = {https://cybersecurityventures.com/global-ransomware-damage-costs-predicted-to-reach-20-billion-usd-by-2021/},
urldate = {2023-02-01}
}
@misc{betancourt,
doi = {10.48550/ARXIV.1601.00225},
url = {https://arxiv.org/abs/1601.00225},
author = {Betancourt, Michael},
keywords = {Methodology (stat.ME), Computation (stat.CO), FOS: Computer and information sciences, FOS: Computer and information sciences},
title = {Identifying the Optimal Integration Time in Hamiltonian Monte Carlo},
publisher = {arXiv},
year = {2016},
copyright = {arXiv.org perpetual, non-exclusive license}
}
@article{chen,
title = {Feature set identification for detecting suspicious URLs using Bayesian classification in social networks},
journal = {Information Sciences},
volume = {289},
pages = {133-147},
year = {2014},
issn = {0020-0255},
doi = {https://doi.org/10.1016/j.ins.2014.07.030},
url = {https://www.sciencedirect.com/science/article/pii/S0020025514007300},
author = {Chia-Mei Chen and D.J. Guan and Qun-Kai Su},
keywords = {Social network, Anomaly detection, Bayesian classification},
abstract = {Social network services (SNSs) are increasing popular. Communicating with friends forms a social network that can be used to promptly share information with friends. In targeted attacks, SNSs are often used to collect personal information and craft attacks based on a specific user profile. Malware can be used to facilitate social relationship, sends messages containing malicious URLs, lures users to click on these URLs by employing social engineering techniques; then replicates through the social network over and over again. Because users are curious and trust in their friends, they typically click on malicious URLs without verification. In this study, a feature set is presented that combines the features of traditional heuristics and social networking. Furthermore, a suspicious URL identification system for use in social network environments is proposed based on Bayesian classification. The experimental results indicate that the proposed approach achieves a high detection rate.}
}
@article{singh,
title = {Malicious and Benign Webpages Dataset},
journal = {Data in Brief},
volume = {32},
pages = {106304},
year = {2020},
issn = {2352-3409},
doi = {https://doi.org/10.1016/j.dib.2020.106304},
url = {https://www.sciencedirect.com/science/article/pii/S2352340920311987},
author = {A.K. Singh},
keywords = {Web security, Malicious webpages, Machine learning, Deep learning, Malicious JavaScript},
abstract = {Web Security is a challenging task amidst ever rising threats on the Internet. With billions of websites active on Internet, and hackers evolving newer techniques to trap web users, machine learning offers promising techniques to detect malicious websites. The dataset described in this manuscript is meant for such machine learning based analysis of malicious and benign webpages. The data has been collected from Internet using a specialized focused web crawler named MalCrawler [1]. The dataset comprises of various extracted attributes, and also raw webpage content including JavaScript code. It supports both supervised and unsupervised learning. For supervised learning, class labels for malicious and benign webpages have been added to the dataset using the Google Safe Browsing API.1 The most relevant attributes within the scope have already been extracted and included in this dataset. However, the raw web content, including JavaScript code included in this dataset supports further attribute extraction, if so desired. Also, this raw content and code can be used as unstructured data input for text-based analytics. This dataset consists of data from approximately 1.5 million webpages, which makes it suitable for deep learning algorithms. This article also provides code snippets used for data extraction and its analysis.}
}
@INPROCEEDINGS{singh2,
author={Singh, A K and Goyal, Navneet},
booktitle={2019 11th International Conference on Communication Systems & Networks (COMSNETS)},
title={A Comparison of Machine Learning Attributes for Detecting Malicious Websites},
year={2019},
volume={},
number={},
pages={352-358},
doi={10.1109/COMSNETS.2019.8711133}}
@article{akiLoo,
doi = {10.48550/ARXIV.2008.10296},
url = {https://arxiv.org/abs/2008.10296},
author = {Sivula, Tuomas and Magnusson, Måns and Matamoros, Asael Alonzo and Vehtari, Aki},
keywords = {Methodology (stat.ME), FOS: Computer and information sciences, FOS: Computer and information sciences},
title = {Uncertainty in Bayesian Leave-One-Out Cross-Validation Based Model Comparison},
publisher = {arXiv},
year = {2020},
copyright = {arXiv.org perpetual, non-exclusive license}
}