A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromise
暂无分享,去创建一个
Kim-Kwang Raymond Choo | Zahid Anwar | Tehmina Amjad | Umara Noor | Z. Anwar | Tehmina Amjad | Umara Noor
[1] Marc Dacier,et al. On a multicriteria clustering approach for attack attribution , 2010, SKDD.
[2] Stephanie Forrest,et al. Strategic aspects of cyberattack, attribution, and blame , 2017, Proceedings of the National Academy of Sciences.
[3] H. Dua,et al. The eye of the tiger , 2010, British Journal of Ophthalmology.
[4] Qiang Li,et al. Framework of Cyber Attack Attribution Based on Threat Intelligence , 2016, InterIoT/SaSeIoT.
[5] Gregory N. Larsen,et al. Techniques for Cyber Attack Attribution , 2003 .
[6] Eric F Mejia,et al. ACT AND ACTOR ATTRIBUTION IN CYBERSPACE: A PROPOSED ANALYTIC FRAMEWORK , 2014 .
[7] Robert C. Atkinson,et al. Threat analysis of IoT networks using artificial neural network intrusion detection system , 2016, 2016 International Symposium on Networks, Computers and Communications (ISNCC).
[8] Urban Bilstrup,et al. Behind the Mask - Attribution of antagonists in cyberspace and its implications on international conflicts and security issues , 2015 .
[9] D. Clark. Untangling Attribution , 2010 .
[10] N. Campbell,et al. Scientific Inference , 1931, Nature.
[11] Carsten Willems,et al. Automatic analysis of malware behavior using machine learning , 2011, J. Comput. Secur..
[12] Richard E. Overill,et al. Detection of known and unknown DDoS attacks using Artificial Neural Networks , 2016, Neurocomputing.
[13] Paulo Shakarian,et al. Cyber-deception and attribution in capture-the-flag exercises , 2015, 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).
[14] Jürgen Schmidhuber,et al. Deep learning in neural networks: An overview , 2014, Neural Networks.
[15] Je-Won Kang,et al. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security , 2016, PloS one.
[16] Kim-Kwang Raymond Choo. Cyber threat landscape faced by financial and insurance industry , 2011 .
[17] Tim Watson,et al. A taxonomy of technical attribution techniques for cyber attacks , 2012 .
[19] J. Ross Quinlan,et al. Induction of Decision Trees , 1986, Machine Learning.
[20] Carrie Gates,et al. Attribution requirements for next generation Internets , 2011, 2011 IEEE International Conference on Technologies for Homeland Security (HST).
[21] Paulo Shakarian,et al. Cyber Attribution: An Argumentation-Based Approach , 2015, Cyber Warfare.
[22] Leo Breiman,et al. Random Forests , 2001, Machine Learning.