暂无分享,去创建一个
Jiawei Zhou | Zhiying Xu | Alexander M. Rush | Minlan Yu | Minlan Yu | Jiawei Zhou | Zhiying Xu | Minlan Yu
[1] Max Welling,et al. Semi-Supervised Classification with Graph Convolutional Networks , 2016, ICLR.
[2] Prateek Mittal,et al. BotGrep: Finding P2P Bots with Structured Graph Analysis , 2010, USENIX Security Symposium.
[3] Natalia Gimelshein,et al. PyTorch: An Imperative Style, High-Performance Deep Learning Library , 2019, NeurIPS.
[4] Pat Langley,et al. Crafting Papers on Machine Learning , 2000, ICML.
[5] Michael K. Reiter,et al. Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs , 2007, RAID.
[6] Jure Leskovec,et al. Modeling polypharmacy side effects with graph convolutional networks , 2018, bioRxiv.
[7] Alejandro Zunino,et al. An empirical comparison of botnet detection methods , 2014, Comput. Secur..
[8] Dave Levin,et al. Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet , 2019, NDSS.
[9] Xavier Bresson,et al. An Experimental Study of Neural Networks for Variable Graphs , 2018, ICLR.
[10] Karel Bartos,et al. Optimized Invariant Representation of Network Traffic for Detecting Unseen Malware Variants , 2016, USENIX Security Symposium.
[11] Samuel S. Schoenholz,et al. Neural Message Passing for Quantum Chemistry , 2017, ICML.
[12] Ali A. Ghorbani,et al. Detecting P2P botnets through network behavior analysis and machine learning , 2011, 2011 Ninth Annual International Conference on Privacy, Security and Trust.
[13] David R. Karger,et al. Koorde: A Simple Degree-Optimal Distributed Hash Table , 2003, IPTPS.
[14] Avinash C. Kak,et al. A graph-theoretic framework for isolating botnets in a network , 2015, Secur. Commun. Networks.
[15] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[16] Marc Brockschmidt,et al. Learning to Represent Programs with Graphs , 2017, ICLR.
[17] Guofei Gu,et al. BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic , 2008, NDSS.
[18] Herbert Bos,et al. Reliable Recon in Adversarial Peer-to-Peer Botnets , 2015, Internet Measurement Conference.
[19] Márk Jelasity,et al. Towards Automated Detection of Peer-to-Peer Botnets: On the Limits of Local Approaches , 2009, LEET.
[20] Zhiyuan Liu,et al. Graph Neural Networks: A Review of Methods and Applications , 2018, AI Open.
[21] Michalis Faloutsos,et al. Exploiting dynamicity in graph-based traffic analysis: techniques and applications , 2009, CoNEXT '09.
[22] Pietro Liò,et al. Graph Attention Networks , 2017, ICLR.
[23] Nick Feamster,et al. Machine Learning DDoS Detection for Consumer Internet of Things Devices , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[24] Guofei Gu,et al. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection , 2008, USENIX Security Symposium.
[25] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[26] Jan Eric Lenssen,et al. Fast Graph Representation Learning with PyTorch Geometric , 2019, ArXiv.