[1] |
S.Aebersold, K. Kryszczuk, S. Paganoni, B. Tellenbach, T. Trowbridge , “Detecting Obfuscated JavaScriptsUsing Machine Learning,” in Proceedings of the Eleventh International Conference on Internet Monitoring and Protection, pp. 11-16, 2016
|
[2] |
P. P.F. Chan, L. C. K. Hui, and S. M. Yiu, “Heap Graph based Software Theft Detection,” IEEE Transactions on Information Forensics and Security, Vol. 8, No. 1, pp. 101-110, 2013
doi: 10.1109/TIFS.2012.2223685
|
[3] |
J. Su, K. Yoshioka, J. Shikata, T. Matsumoto, “An Efficient Method for Detecting Obfuscated Suspicious JavaScript based on Text Pattern Analysis, ” in Proceedings of the 2016 ACM International on Workshop on Traffic Measurements for Cybersecurity, pp. 3-11, 2016
doi: 10.1145/2903185.2903189
|
[4] |
H. B. Chen , “Research and Implementation on Machine Learning-based Detection of Malicious Script Codes, ”Zhejiang University of Technology, 2011
|
[5] |
M. Jodavi, M. Abadi, E. Parhizkar , “JSObfusDetector: A Binary PSO-based One-Class Classifier Ensemble to Detect Obfuscated JavaScript Code, ” in Proceedings of 2015 International Symposium onArtificial Intelligence and Signal Processing (AISP), pp. 322-327, 2015
doi: 10.1109/AISP.2015.7123508
|
[6] |
H. L. Ma, W. Wang, Z. Han , “Detecting and De-Obfuscating Obfuscated Malicous JavaScript Code,” Chinese Journal of Computers, Vol. 40, No. 7, pp. 1699-1713, 2017
|
[7] |
J. Quackenbush , “Microarray Data Normalization and Transformation,” Nature Genetics, Vol. 32, pp. 496-501, 2002
|
[8] |
J. B. Yang, W. Q. Zhang, J. Liu , “Investigation of Normalization Methods in Speaker Adaptation of Deep Neural Network Using Ivector,” Journal of University of Chinese Academy of Sciences, Vol. 34, No. 5, pp. 633-639, 2017
|
[9] |
X. Xiao and L. Zhou, “Speech Recognition Adaptive Clustering Feature Extraction Algorithms based on thek-Means Algorithm and the Normalized Intra-Class Variance,” Journal of Tsinghua University (Science and Technology), Vol. 8, pp. 857-861, 2017
|
[10] |
M. Mohri, A. Rostamizadeh, A. Talwalkar , “Foundations of Machine Learning, ” Foundations of Machine Learning,MIT Press, pp. 287-306, 2012
|
[11] |
A. Krizhevsky, I. Sutskever, G. E. Hinton , “ImageNet Classification with Deep Convolutional Neural Networks,” Communications of the ACM, Vol. 60, No. 2, pp. 1-13, 2012
doi: 10.1145/3065386
|
[12] |
Alexa Top Global Sites( , accessed March 2018 http://www.alexa.com/topsites/
|
[13] |
Free JavaScript Obfuscator ( , accessed March 2018 http://www.javascriptobfuscator.com/
|
[14] |
JavaScript Obfuscator/Encoder ( , accessed March 2018 http://www.javascriptobfuscator.com/
|
[15] |
T. Dietterich , “Overfitting and Undercomputing in Machine Learning,” ACM Computing Surveys, Vol. 27, No. 3, pp. 326-327, 1995
doi: 10.1145/212094.212114
|
[16] |
J. Tang, S. Alelyani, H. Liu , “Feature Selection for Classification: A Review,” Documentación Administrativa, pp. 313-334, 2014
|