1 T. Nelms, "Webwitness : Investigating, categorizing, and mitigating malware download paths" 1025-1040, 2015
2 S. J. Kim, "WebMon : ML-and YARA-based malicious webpage detection" 137 : 119-131, 2018
3 "Thug"
4 "The Open Graph Viz Platform"
5 "OpenGraphiti"
6 "NetMiner"
7 S. Kim, "Malicious URL protection based on attackers' habitual behavioral analysis" 77 : 790-806, 2018
8 김성진 ; 김성규 ; 김도훈, "LoGos: Internet-Explorer-Based Malicious Webpage Detection" 한국전자통신연구원 39 (39): 406-416, 2017
9 H. Gao, "Detecting and characterizing social spam campaigns" 35-47, 2010
10 "Centrality"
1 T. Nelms, "Webwitness : Investigating, categorizing, and mitigating malware download paths" 1025-1040, 2015
2 S. J. Kim, "WebMon : ML-and YARA-based malicious webpage detection" 137 : 119-131, 2018
3 "Thug"
4 "The Open Graph Viz Platform"
5 "OpenGraphiti"
6 "NetMiner"
7 S. Kim, "Malicious URL protection based on attackers' habitual behavioral analysis" 77 : 790-806, 2018
8 김성진 ; 김성규 ; 김도훈, "LoGos: Internet-Explorer-Based Malicious Webpage Detection" 한국전자통신연구원 39 (39): 406-416, 2017
9 H. Gao, "Detecting and characterizing social spam campaigns" 35-47, 2010
10 "Centrality"
11 "Alexa"
12 S. Huh, "A Comprehensive Analysis of Today’s Malware and Its Distribution Network : Common Adversary Strategies and Implications" 10 : 49566-49584, 2022