|
[1]EarthLink Inc., “EarthLink Spy Audit,” http://www.earthlink.net/about/press/pr_spyAudit/ , April 2004. [2]The Kaspersky Lab, http://www.kaspersky.com. [3]McAfee, Inc, http://www.mcafee.com/us/. [4]Trend Micro, Inc, http://www.trendmicro.com/en/home/us/enterprise.htm. [5]Symantec Corporation, http://www.symantec.com/index.htm. [6]J-Y. Xu, A. H. Sung, P. Chavez, S. Mukkamala, “Polymorphic Malicious Executable Scanner by API Sequence Analysis”, Fourth International Conference on Hybrid Intelligent Systems (HIS''04) , pp. 378-383. [7]Matt Pietrek, “An In-Depth Look into the Win32 Portable Executable File Format”, MSDN Magazine, Feb. 2002. [8]V. N. Vapnik, Statistical Learning Theory, John Wiley and Sons, New York, 1998. [9]Jeremy Z. kolter & Marcus A. Maloof, “Learning to Detect Malicious Executables in the Wild”, ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Aug 2004, pp. 470 – 478. [10]Tzu-Yen Wang, Shi-Jinn Horng, Ming-Yang Su, Chin-Hsiung Wu, Peng-Chu Wang and Wei-Zen Su,” A Surveillance Spyware Detection System Based on Data Mining Methods”, 2006 IEEE Congress on Evolutionary Computation Sheraton Vancouver Wall Centre Hotel, Vancouver, BC, Canada July 16-21, 2006 [11]J. Bergeron, M. Debbabi, J. Desharnais, M. Erhioui, Y.Lavoie, and N. Tawbi, “Static detection of malicious code in executable programs”, Symposium on Requirements Engineering for Information Security, Mar. 2001, pp. 1–8. [12]C. Cifuentes, T. Waddington, M. Van Emmerik, “Computer Security Analysis through Decompilation and High-Level Debugging,” the 8th IEEE Working Conference on Reverse Engineering, Oct.2001, pp.375-380. [13]Matthew G. Schultz, Eleazar Eskin, Erez Zadok, and Salvatore J. Stolfo, “Data Mining Methods for Detection of New Malicious Executables”, IEEE Symposium on Security and Privacy, May 2001, pp.38-49. [14]Michael Weber, Matthew Schmid, Michael Schatz & David Geyer, “A Toolkit for Detecting and Analyzing Malicious Software”, Proceedings of the 18th Annual Computer Security Applications Conference, Dec. 2002, pp.423-. [15]Stefan Saroiu, Steven D. Gribble, and Henry M.Levy, “Measurement and Analysis of Spyware in a University [16]Alexander Strehl, Joydeep Ghosh, and Raymond Mooney, “Impact of Similarity Measures on Web-page Clustering”, AAAI-2000:Workshop of Artificial [17]Quinlan, J.R., “Induction of Decision Tree”, Machine Learning, 1986, pp.81-106.Intelligence for Web Search, July 2000. [18]資料採礦理論與實務 Michael J.A.Berry, Gordon S.Linoff合著,臺北市:數博網資訊股份有限公司,2001年6月 [19] Spyware Website, http://www.mmbest.com/index.html [20] Spyware Website, http://www.hacker.org.tw/?c=download&sortid=1 [21] Spyware Webstie, http://www.kobayashi.cjb.net/ [22] Spyware Webstie, http://www.xfocus.net/index.html [23] Spyware Webstie, http://www.hf110.com/Index.html [24] Spyware Webstie, http:// www.hacker365.com [25] Spyware Webstie, http://www.heibai.net/main.htm
|