Last update: Sun Oct 15 02:37:28 MDT 2017
Top |
Symbols |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Zhang:2012:PGA,
author = "Jialong Zhang and Chao Yang and Zhaoyan Xu and Guofei
Gu",
title = "{PoisonAmplifier}: a Guided Approach of Discovering
Compromised {Websites} through Reversing Search
Poisoning Attacks",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7462",
pages = "230--253",
year = "2012",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-33338-5_12",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Wed Dec 19 15:23:06 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2012h.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-33338-5_12/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-33338-5",
book-URL = "http://www.springerlink.com/content/978-3-642-33338-5",
fjournal = "Lecture Notes in Computer Science",
}
Related entries
- Approach,
7451(0)84,
7451(0)99,
7451(0)151,
7452(0)79,
7452(0)140,
7455(0)168,
7456(0)154,
7457(0)229,
7459(0)289,
7461(0)196,
7465(0)31,
7466(0)226,
7466(0)241,
7467(0)151,
7469(0)152,
7470(0)1,
7477(0)151,
7478(0)132,
7478(0)187,
7479(0)23,
7481(0)120,
7481(0)200,
7483(0)306,
7484(0)40,
7484(0)191,
7485(0)131,
7486(0)110,
7486(0)128,
7486(0)195,
7487(0)329,
7489(0)179,
7494(0)135,
7495(0)111,
7496(0)300,
7497(0)90,
7498(0)19,
7498(0)51,
7499(0)158
- Attack,
7459(0)37,
7459(0)199,
7459(0)235,
7462(0)64,
7462(0)107,
7473(0)45,
7483(0)23,
7485(0)326
- Search,
7455(0)137,
7457(0)1,
7461(0)85,
7461(0)204,
7465(0)259,
7482(0)93,
7484(0)141,
7488(0)67,
7489(0)1,
7496(0)235,
7499(0)88
- through,
7450(0)13,
7452(0)103,
7453(0)79,
7455(0)153,
7462(0)22,
7468(0)31,
7469(0)119,
7471(0)151,
7476(0)185,
7477(0)115,
7477(0)151,
7492(0)42,
7497(0)188