|
[1]“The onion router(Tor) [Online]. Available: https://www.torproject.org/. [Accessed 2018/07/1]. [2]“Tor metrics [Online]. Available: https://metrics.torproject.org/. [Accessed 2018/07/1]. [3]Jansen, R., & Hooper, N. (2011). Shadow: Running Tor in a box for accurate and efficient experimentation (No. TR-11-020). MINNESOTA UNIV MINNEAPOLIS DEPT OF COMPUTER SCIENCE AND ENGINEERING. [4]Wardana, H. K., Handianto, L. F., & Yohanes, B. W. (2017, September). The onion routing performance using shadow-plugin-TOR. In Electrical Engineering, Computer Science and Informatics (EECSI), 2017 4th International Conference on (pp. 1-5). IEEE. [5]“dmoz [Online]. Available: http://dmoz-odp.org/. [Accessed 2018/07/1]. [6]“VirusTotal [Online]. Available: https://www.virustotal.com/zh-tw/. [Accessed 2018/07/1]. [7]Qi, X., & Davison, B. D. (2009). Web page classification: Features and algorithms. ACM computing surveys (CSUR), 41(2), 12. [8]Lim, C. S., Lee, K. J., & Kim, G. C. (2005). Multiple sets of features for automatic genre classification of web documents. Information processing & management, 41(5), 1263-1276. [9]Zhang, J., Qin, J., & Yan, Q. (2006, December). The role of URLs in objectionable web content categorization. In Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence (pp. 277-283). IEEE Computer Society. [10]Wikipedia, RSA (cryptosystem) [Online]. Available: https://en.wikipedia.org/wiki/RSA_(cryptosystem). [Accessed 2018/07/1]. [11]Wikipedia, Advanced Encryption Standard [Online]. Available: https://en.wikipedia.org/wiki/Advanced_Encryption_Standard. [Accessed 2018/07/1]. [12]Hsu, C. W., Chang, C. C., & Lin, C. J. (2003). A practical guide to support vector classification. [13]Rish, I. (2001, August). An empirical study of the naive Bayes classifier. In IJCAI 2001 workshop on empirical methods in artificial intelligence (Vol. 3, No. 22, pp. 41-46). New York: IBM. [14]Brown, P. F., Desouza, P. V., Mercer, R. L., Pietra, V. J. D., & Lai, J. C. (1992). Class-based n-gram models of natural language. Computational linguistics, 18(4), 467-479. [15]Cavnar, W. B. (1993). N-gram-based text filtering for TREC-2. Ann Arbor, 1001, 48113-4001. [16]Kimbrell, R. E. (1988). Searching for text? Send an n-gram. Byte, 13(5), 297-312. [17]Suen, C. Y. (1979). N-gram statistics for natural language understanding and text processing. IEEE transactions on pattern analysis and machine intelligence, (2), 164-172. [18]Guyon, I., & Elisseeff, A. (2003). An introduction to variable and feature selection. Journal of machine learning research, 3(Mar), 1157-1182. [19]Biesiada, J., & Duch, W. (2007). Feature selection for high-dimensional data—a Pearson redundancy based filter. In Computer recognition systems 2 (pp. 242-249). Springer, Berlin, Heidelberg. [20]Kan, M. Y., & Thi, H. O. N. (2005, October). Fast webpage classification using URL features. In Proceedings of the 14th ACM international conference on Information and knowledge management (pp. 325-326). ACM. [21]Baykan, E., Henzinger, M., Marian, L., & Weber, I. (2009, April). Purely URL-based topic classification. In Proceedings of the 18th international conference on World wide web (pp. 1109-1110). ACM. [22]Rajalakshmi, R., and C. Aravindan. Naive bayes approach for website classification. Information Technology and Mobile Communication. Springer, Berlin, Heidelberg, 2011. 323-326. [23]Rajalakshmi, R., & Aravindan, C. (2013, December). Web page classification using n-gram based URL features. In Advanced Computing (ICoAC), 2013 Fifth International Conference on (pp. 15-21). IEEE.
|