1Steve R W,Morton S,et al.Anatomy of a Commercial-Grade Immune System[R].IBM Research White Paper,1999.
2William C.Learning trees and rules with setValued features[A].American Association for Artificial Intelligence(AAAI)[C].Menlo Park,CA:AAAI Press,1996.(1).709-716.
3Matthew GS,Eleazer E,et al.Data mining methods for detection of new malicious executables[A].IEEE Symposium on Security and Privacy[C].Oakland,CA,May 2001:1207-1217.
5Vapnik V N.The Nature of Statistical Learning Theory[M].New York: Spring-Verlag,1995.
6Mahmoud K, Youssef I, Andrew J. Phishing detection: A literature survey. IEEE Communications Surveys & Tutorials, 2013, 15(4): 2091-2121.
7Paul K, Georgia K, Hector G M. Fighting spam on social Web sites a survey of approaches and future challenges. IEEE Internet Computing, 2007, 11(6): 36-45.
8Priya M, Sandhya L, Ciza T. A static approach to detect drive-by-download attacks on Webpages//Proceedings of the International Conference on Control Communication and Computing. Xi'an, China, 2013:298-303.
9Mavrommatis N P P, Monrose M A R F. All your iframes point to us//Proceedings of the 17th USENIX Security Symposium. San Jose, USA, 2008:1-22.
10Ma J, Saul L K, Savage S, Voetker G M. Beyond blacklists: Learning to detect malicious Web sites from suspicious URLs//Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York, USA, 2009: 1245-1253.