Fingerprinting for security, IEEE Potentials, vol.20, issue.3, pp.33-38, 2001. ,
DOI : 10.1109/45.954536
Toward undetected operating system fingerprinting, Proceedings of the first USENIX workshop on Offensive Technologies. USENIX Association, pp.1-10, 2007. ,
How unique is your web browser? " in Privacy Enhancing Technologies, pp.1-18, 2010. ,
Fingerprinting information in javascript implementations, Proceedings of Web, 2011. ,
Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications, Detection of Intrusions and Malware, and Vulnerability Assessment, pp.157-175, 2009. ,
DOI : 10.1007/978-3-540-31966-5_7
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.158.104
The WEKA data mining software, ACM SIGKDD Explorations Newsletter, vol.11, issue.1, pp.10-18, 2009. ,
DOI : 10.1145/1656274.1656278
5: programs for machine learning, 1993. ,
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks, Detection of Intrusions and Malware, and Vulnerability Assessment, pp.88-106, 2009. ,
DOI : 10.1109/MSP.2007.45
A virtual honeypot framework, Proceedings of the 13th USENIX security symposium, 2004. ,
Honeyc-the low-interaction client honeypot, Proceedings of the 2007 NZCSRCS, 2007. ,
Dynamic Analysis of Malicious Code, Journal in Computer Virology, vol.2, issue.1, pp.67-77, 2006. ,
DOI : 10.1007/s11416-006-0012-2
Phoneyc: a virtual client honeypot, Proceedings of the 2nd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more. USENIX Association, pp.6-6, 2009. ,
Passive operating system identification from tcp/ip packet headers, Workshop on Data Mining for Computer Security, p.40, 2003. ,
Client fingerprinting via analysis of browser scripting environment, SANS Information Security Reading Room, 2010. ,