参考文献
|
-
“virustotal”,https://www.virustotal.com/zh-tw/
-
“最新手機/LINE 詐騙簡訊一覽表!”,2014,http://blog.trendmicro.com.tw/?p=6279.
-
“New Malware,” 2014, http://www.av-test.org/en/statistics/malware/.
-
“What is Apache Hadoop ? ,” 2014, http://hadoop.apache.org/#What+Is+Apache+Hadoop%3F
-
“HBase Snapshots,” 2014, http://hbase.apache.org/book.html#ops.snapshots.
-
“標準偏差”,2014,http://zh.wikipedia.org/wiki/%E6%AD%A3%E6%80%81%E5%88%86%E5%B8%83#.E6.A8.99.E6.BA.96.E5.81.8F.E5.B7.AE
-
E. Baldeschwieler, “Hadoop Now, Next & Beyond,” 2013, http://www.slideshare.net/Hadoop_Summit/apache-hadoop-now-next-and-beyond
-
“Database Sharding,” 2014, http://en.wikipedia.org/wiki/Database_sharding.
-
“Domain generation algorithm,”2014, http://en.wikipedia.org/wiki/Domain_generation_algorithm
-
“大數據”,2014,http://zh.wikipedia.org/wiki/%E5%A4%A7%E6%95%B8%E6%93%9A.
-
J. Dorrier, “There Are 7 Billion Mobile Devices On Earth, Almost One For Each Person,”2014, http://singularityhub.com/2014/02/18/there-are-7-billion-mobile-devices-on-earth-almost-one-for-each-person/.
-
趙郁竹,“2020駭客風暴,密切注意!小心,病毒就在你身邊”,2014,http://www.bnext.com.tw/article/view/id/30679.
-
“Who uses Hadoop ?,” 2014, http://wiki.apache.org/hadoop/PoweredBy.
-
“PageRank,” 2014, http://zh.wikipedia.org/wiki/Pagerank.
-
“《APT 攻擊》南韓爆發史上最大駭客攻擊 企業及個人用戶電腦皆停擺”,2013,http://blog.trendmicro.com.tw/?p=4524.
-
“Chapter 4. The Apache HBase Shell,” 2014, https://hbase.apache.org/book/shell_tricks.html
-
“Apache Pig,” 2014, http://pig.apache.org/.
-
“什麼是 APT 進階持續性威脅 (Advanced Persistent Threat, APT)?”,2011,http://blog.trendmicro.com.tw/?p=123&apt/%E4%BB%80%E9%BA%B C%E6%98%AF-apt%E9%80%B2%E9%9A%8E%E6%8C%81%E7%BA%8C%E6%80%A7%E5%A8%81%E8%84%85-advanced-persistent-threat-apt%EF%BC%9F.
-
“雲端運算防毒是趨勢:趨勢科技 Trend Micro Smart Protection Network 主動式雲端截毒服務-更加聰明的防護”, http://www.trendmicro.com.tw/spn/index.asp.
-
M.A. Rodriguez, “Property Graph Model," 2012, https://github.com/tinkerpop/blueprints/wiki/Property-Graph-Model
-
“Apache Hbase,” 2014, http://hbase.apache.org/.
-
“Apache Pig User Defined Functions,” 2014, http://pig.apache.org/docs/r0.11.1/udf.html.
-
“惡意程式-Stuxnet簡介”,臺灣電腦網路危機處理暨協調中心,http://www.cert.org.tw/docfile/Stuxnet.pdf
|