Detecting malicious exploit kits using tree-based similarity searchesTeryl TaylorXin Huet al.2016CODASPY 2016