Automation for information security using machine learning

Many tasks in information security require data analysis to ensure the security of information and information systems. The amount of data that a security officer typically needs to analyze is large, which makes the automation of such analysis highly desirable. One way to achieve such automation of security tasks is by using machine learning. Machine learning techniques aim to solve tasks by learning a model from data, thereby drastically reducing the need for human labor. However, to apply machine learning on information security tasks a number of challenges need to be addressed. Currently, research on information security concerning machine learning focuses mainly on two areas: the application of machine learning to solve particular security tasks, and the design of secure machine learning algorithms. In this work, we focus on three challenges that are crucial for the application of machine learning in information security: the lack of supervision, the integration of domain knowledge and the lack of contextual information. To address them, we select two specific tasks from two use cases, one from forensic log analysis and one from intrusion detection, in particular, data leakage detection. To address these challenges, we propose the following: a method for signature extraction from forensic logs to verify our assumption that deep learning models are well-suited for capturing the structure of such logs; an unsupervised method for clustering forensic logs to address the lack of supervision; a method for integrating domain knowledge in the machine learning process; and a method that can create believable project decoys in a data-driven way that could be used for obtaining the lacking contextual information. In this thesis, we empirically show the following: i) deep learning models are well-suited for modeling semi-structured forensic logs, hence can be used for signature extraction better than the state-of-the-art ii) deep learning models can outperform state-of-the-art methods for clustering forensic logs in an unsupervised way, which means that we can address such a problem without using labels iii) we can use domain knowledge to improve the learning of deep learning models for the clustering of forensic logs and iv) Markov Chains can be automated to generate believable project decoys in a data-driven way. The proposed methods demonstrate ways to address the lack of supervision, the integration of domain knowledge, and the lack of contextual information. Addressing these challenges leads to the advancement of automation for information security when using machine learning. Apart from that, we believe that a similar, machine learning based methods can be applied to other data theft scenarios, with different types of decoy objects. Furthermore, we believe that similar DL-based methods as the ones proposed in this thesis could be applied to automate other tasks with similar challenges, for example, malware analysis or the detection of phishing attacks.

[1]  Lakshminarayanan Subramanian,et al.  The Fake vs Real Goods Problem: Microscopy and Machine Learning to the Rescue , 2017, KDD.

[2]  Geoffrey E. Hinton,et al.  ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.

[3]  Yoshua Bengio,et al.  Gated Feedback Recurrent Neural Networks , 2015, ICML.

[4]  Jerry den Hartog,et al.  Cross-Domain Attribute Conversion for Authentication and Authorization , 2015, 2015 10th International Conference on Availability, Reliability and Security.

[5]  Wei Wang,et al.  The robustness of hollow CAPTCHAs , 2013, CCS.

[6]  Thirimachos Bourlai,et al.  Gender and ethnicity classification using deep learning in heterogeneous face recognition , 2016, 2016 International Conference on Biometrics (ICB).

[7]  Yuan Yu,et al.  TensorFlow: A system for large-scale machine learning , 2016, OSDI.

[8]  Andrew Zisserman,et al.  Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.

[9]  C. Stoll The Cuckoo's Egg : Tracking a Spy Through the Maze of Computer Espionage , 1990 .

[10]  Hua Liu,et al.  Watch Me, but Don't Touch Me! Contactless Control Flow Monitoring via Electromagnetic Emanations , 2017, CCS.

[11]  Jeffrey Pennington,et al.  GloVe: Global Vectors for Word Representation , 2014, EMNLP.

[12]  Yoshua Bengio,et al.  A Neural Probabilistic Language Model , 2003, J. Mach. Learn. Res..

[13]  Yongfeng Huang,et al.  RNN-SM: Fast Steganalysis of VoIP Streams Using Recurrent Neural Network , 2018, IEEE Transactions on Information Forensics and Security.

[14]  Elena Paslaru Bontas Simperl,et al.  An Experiment in Comparing Human-Computation Techniques , 2012, IEEE Internet Computing.

[15]  Kuldip K. Paliwal,et al.  Bidirectional recurrent neural networks , 1997, IEEE Trans. Signal Process..

[16]  Moritz Marc Beller,et al.  An Empirical Evaluation of Feedback-Driven Software Development , 2018 .

[17]  W. Lueks,et al.  Security and Privacy via Cryptography Having your cake and eating it too , 2017 .

[18]  Y Yaping Luo,et al.  From conceptual models to safety assurance : applying model-based techniques to support safety assurance , 2016 .

[19]  Yu Zhang,et al.  Automatic Mobile Application Traffic Identification by Convolutional Neural Networks , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[20]  Shiho Moriai,et al.  Privacy-Preserving Deep Learning via Additively Homomorphic Encryption , 2018, IEEE Transactions on Information Forensics and Security.

[21]  Yoshua Bengio,et al.  Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling , 2014, ArXiv.

[22]  Neil C. Rowe Automatic Detection of Fake File Systems , 2005 .

[23]  Anil K. Jain,et al.  Face retriever: Pre-filtering the gallery via deep neural net , 2015, 2015 International Conference on Biometrics (ICB).

[24]  Cornelia Caragea,et al.  Content-Driven Detection of Cyberbullying on the Instagram Social Network , 2016, IJCAI.

[25]  Maarten Versteegh,et al.  Learning Text Similarity with Siamese Recurrent Networks , 2016, Rep4NLP@ACL.

[26]  Jürgen Schmidhuber,et al.  Stacked Convolutional Auto-Encoders for Hierarchical Feature Extraction , 2011, ICANN.

[27]  Jeff Yan,et al.  A security analysis of automated chinese turing tests , 2016, ACSAC.

[28]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[29]  Vitaly Shmatikov,et al.  Beauty and the Burst: Remote Identification of Encrypted Video Streams , 2017, USENIX Security Symposium.

[30]  Prateek Saxena,et al.  Auror: defending against poisoning attacks in collaborative deep learning systems , 2016, ACSAC.

[31]  Zhi-Hua Zhou,et al.  A brief introduction to weakly supervised learning , 2018 .

[32]  Yoshua Bengio,et al.  Learning long-term dependencies with gradient descent is difficult , 1994, IEEE Trans. Neural Networks.

[33]  Razvan Pascanu,et al.  On the difficulty of training recurrent neural networks , 2012, ICML.

[34]  Jaideep Srivastava,et al.  A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection , 2003, SDM.

[35]  Mitsugu Iwamoto,et al.  Deep-Learning-Based Security Evaluation on Authentication Systems Using Arbiter PUF and Its Variants , 2016, IWSEC.

[36]  Jason Weston,et al.  Natural Language Processing (Almost) from Scratch , 2011, J. Mach. Learn. Res..

[37]  Bin Li,et al.  Detection of Double Compressed AMR Audio Using Stacked Autoencoder , 2017, IEEE Transactions on Information Forensics and Security.

[38]  Yoshua Bengio,et al.  Show, Attend and Tell: Neural Image Caption Generation with Visual Attention , 2015, ICML.

[39]  Dieter Fensel,et al.  Knowledge Modeling of On-line Value Management , 2012, ESWC.

[40]  Jeffrey Dean,et al.  Efficient Estimation of Word Representations in Vector Space , 2013, ICLR.

[41]  Frank Harary,et al.  Graph Theory , 2016 .

[42]  Nir Ailon,et al.  Deep Metric Learning Using Triplet Network , 2014, SIMBAD.

[43]  U Ulyana Tikhonova,et al.  Engineering the dynamic semantics of domain specific languages , 2017 .

[44]  Umut Topkara,et al.  A Secure Mobile Authentication Alternative to Biometrics , 2017, ACSAC.

[45]  Jian Sun,et al.  Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[46]  Robert Tibshirani,et al.  Estimating the number of clusters in a data set via the gap statistic , 2000 .

[47]  Salvatore J. Stolfo,et al.  Lost in Translation: Improving Decoy Documents via Automated Translation , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.

[48]  Michael I. Jordan,et al.  Distance Metric Learning with Application to Clustering with Side-Information , 2002, NIPS.

[49]  David Menotti,et al.  Learning Deep Off-the-Person Heart Biometrics Representations , 2017, IEEE Transactions on Information Forensics and Security.

[50]  Minh Hai Nguyen,et al.  Auto-detection of sophisticated malware using lazy-binding control flow graph and deep learning , 2018, Comput. Secur..

[51]  Gregory R. Koch,et al.  Siamese Neural Networks for One-Shot Image Recognition , 2015 .

[52]  Paolo Bestagini,et al.  Data-Driven Feature Characterization Techniques for Laser Printer Attribution , 2017, IEEE Transactions on Information Forensics and Security.

[53]  Ben Y. Zhao,et al.  Automated Crowdturfing Attacks and Defenses in Online Review Systems , 2017, CCS.

[54]  Saeed Darabi,et al.  Verification of Program Parallelization , 2018 .

[55]  Ali Farhadi,et al.  Unsupervised Deep Embedding for Clustering Analysis , 2015, ICML.

[56]  James Philbin,et al.  FaceNet: A unified embedding for face recognition and clustering , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[57]  Martin Steinebach,et al.  Forensic Image Inspection Assisted by Deep Learning , 2017, ARES.

[58]  Hung Q. Ngo,et al.  A Data-Centric Approach to Insider Attack Detection in Database Systems , 2010, RAID.

[59]  Hrishikesh Salunkhe Modeling and buffer analysis of real-time streaming radio applications scheduled on heterogeneous multiprocessors , 2017 .

[60]  Guigang Zhang,et al.  Deep Learning , 2016, Int. J. Semantic Comput..

[61]  Jimmy Ba,et al.  Adam: A Method for Stochastic Optimization , 2014, ICLR.

[62]  David Menotti,et al.  Deep Representations for Iris, Face, and Fingerprint Spoofing Detection , 2014, IEEE Transactions on Information Forensics and Security.

[63]  Vlado Menkovski,et al.  The Role of Deep Learning in Improving Healthcare , 2019, Data Science for Healthcare.

[64]  Nitish Srivastava,et al.  Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..

[65]  Risto Vaarandi,et al.  LogCluster - A data clustering and pattern mining algorithm for event logs , 2015, 2015 11th International Conference on Network and Service Management (CNSM).

[66]  Christopher Krügel,et al.  Meerkat: Detecting Website Defacements through Image-based Object Recognition , 2015, USENIX Security Symposium.

[67]  P. Rousseeuw Silhouettes: a graphical aid to the interpretation and validation of cluster analysis , 1987 .

[68]  Geoffrey E. Hinton,et al.  Speech recognition with deep recurrent neural networks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[69]  Malek Ben Salem,et al.  A Survey of Insider Attack Detection Research , 2008, Insider Attack and Cyber Security.

[70]  Marcus Gerhold,et al.  Choice and chance : model-based testing of stochastic behaviour , 2018 .

[71]  A. Krasnova Smart invaders of private matters: Privacy of communication on the Internet and in the Internet of Things (IoT) , 2017 .

[72]  Tian Zhang,et al.  BIRCH: an efficient data clustering method for very large databases , 1996, SIGMOD '96.

[73]  Yoshua Bengio,et al.  Extracting and composing robust features with denoising autoencoders , 2008, ICML '08.

[74]  Tieniu Tan,et al.  Transferring deep representation for NIR-VIS heterogeneous face recognition , 2016, 2016 International Conference on Biometrics (ICB).

[75]  Elie Bienenstock,et al.  Neural Networks and the Bias/Variance Dilemma , 1992, Neural Computation.

[76]  Lei Zheng,et al.  SEVEN: Deep Semi-supervised Verification Networks , 2017, IJCAI.

[77]  Jiwu Huang,et al.  Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework , 2016, IEEE Transactions on Information Forensics and Security.

[78]  Tom van Dijk,et al.  Sylvan: multi-core decision diagrams , 2015, TACAS.

[79]  Yang Zhong,et al.  Face attribute prediction using off-the-shelf CNN features , 2016, 2016 International Conference on Biometrics (ICB).

[80]  Jürgen Schmidhuber,et al.  Multi-column deep neural networks for image classification , 2012, 2012 IEEE Conference on Computer Vision and Pattern Recognition.

[81]  Yann LeCun,et al.  Signature Verification Using A "Siamese" Time Delay Neural Network , 1993, Int. J. Pattern Recognit. Artif. Intell..

[82]  Michael I. Jordan,et al.  Detecting large-scale system problems by mining console logs , 2009, SOSP '09.

[83]  Thomas G. Dietterich What is machine learning? , 2020, Archives of Disease in Childhood.

[84]  Yuhan Zhang,et al.  Mobile Phone Clustering From Speech Recordings Using Deep Representation and Spectral Clustering , 2018, IEEE Transactions on Information Forensics and Security.

[85]  Hao Chen,et al.  MagNet: A Two-Pronged Defense against Adversarial Examples , 2017, CCS.

[86]  Vlado Menkovski,et al.  Deep Metric Learning for Sequential Data Using Approximate Information , 2018, MLDM.

[87]  A Aminah Zawedde,et al.  Modeling the dynamics of requirements process improvement , 2016 .

[88]  Yann LeCun,et al.  Learning a similarity metric discriminatively, with application to face verification , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[89]  Richa Singh,et al.  Detecting Facial Retouching Using Supervised Deep Learning , 2016, IEEE Transactions on Information Forensics and Security.

[90]  Alex Graves,et al.  Generating Sequences With Recurrent Neural Networks , 2013, ArXiv.

[91]  Elena Paslaru Bontas Simperl,et al.  Combining human and computation intelligence: the case of data interlinking tools , 2012, Int. J. Metadata Semant. Ontologies.

[92]  Sergey Ioffe,et al.  Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.

[93]  Mounim A. El-Yacoubi,et al.  Deep Representation-Based Feature Extraction and Recovering for Finger-Vein Verification , 2017, IEEE Transactions on Information Forensics and Security.

[94]  Vlado Menkovski,et al.  Unsupervised Signature Extraction from Forensic Logs , 2017, ECML/PKDD.

[95]  Yasushi Makihara,et al.  GEINet: View-invariant gait recognition using a convolutional neural network , 2016, 2016 International Conference on Biometrics (ICB).

[96]  Himanshu S. Bhatt,et al.  Domain Specific Learning for Newborn Face Recognition , 2016, IEEE Transactions on Information Forensics and Security.

[97]  Quirijn W. Bouts,et al.  Geographic graph construction and visualization , 2017 .

[98]  Kevin W. Bowyer,et al.  Recognition of Image-Orientation-Based Iris Spoofing , 2017, IEEE Transactions on Information Forensics and Security.

[99]  Ben Whitham AUTOMATING THE GENERATION OF FAKE DOCUMENTS TO DETECT NETWORKINTRUDERS , 2013 .

[100]  Chris Dyer,et al.  On the State of the Art of Evaluation in Neural Language Models , 2017, ICLR.

[101]  Yoshua Bengio,et al.  Generative Adversarial Nets , 2014, NIPS.

[102]  Dieter Fensel,et al.  Effective and Efficient On-Line Communication , 2012, 2012 23rd International Workshop on Database and Expert Systems Applications.

[103]  Paul J. Werbos,et al.  Backpropagation Through Time: What It Does and How to Do It , 1990, Proc. IEEE.

[104]  Mahmoud Talebi,et al.  Scalable performance analysis of wireless sensor networks , 2018 .

[105]  Kwangjo Kim,et al.  Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection , 2018, IEEE Transactions on Information Forensics and Security.

[106]  William C. Barker Guideline for Identifying an Information System as a National Security System , 2003 .

[107]  Baris Ege Physical Security Analysis of Embedded Devices , 2016 .

[108]  Joan Bruna,et al.  Intriguing properties of neural networks , 2013, ICLR.

[109]  Samy Bengio,et al.  Show and tell: A neural image caption generator , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[110]  Rama Chellappa,et al.  Attributes for Improved Attributes: A Multi-Task Network Utilizing Implicit and Explicit Relationships for Facial Attribute Classification , 2017, AAAI.

[111]  M. Alizadeh Auditing of user behavior: identification, analysis and understanding of deviations , 2018 .

[112]  Jian Li,et al.  An Evaluation Study on Log Parsing and Its Use in Log Mining , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[113]  Le Song,et al.  Discriminative Embeddings of Latent Variable Models for Structured Data , 2016, ICML.

[114]  Takashi Nishide,et al.  Network Intrusion Detection Based on Semi-supervised Variational Auto-Encoder , 2017, ESORICS.

[115]  Richa Singh,et al.  Composite sketch recognition via deep network - a transfer learning approach , 2015, 2015 International Conference on Biometrics (ICB).

[116]  Yoshua Bengio,et al.  On Using Very Large Target Vocabulary for Neural Machine Translation , 2014, ACL.

[117]  Quoc V. Le,et al.  Sequence to Sequence Learning with Neural Networks , 2014, NIPS.

[118]  van Ac Allan Hulst,et al.  Control synthesis using modal logic and partial bisimilarity : a treatise supported by computer verified proofs , 2016 .

[119]  Anil K. Jain,et al.  Latent orientation field estimation via convolutional neural network , 2015, 2015 International Conference on Biometrics (ICB).

[120]  Vitaly Shmatikov,et al.  Privacy-preserving deep learning , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[121]  Yoshua Bengio,et al.  Neural Machine Translation by Jointly Learning to Align and Translate , 2014, ICLR.

[122]  Le Song,et al.  Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection , 2018 .

[123]  Patrice Y. Simard,et al.  Best practices for convolutional neural networks applied to visual document analysis , 2003, Seventh International Conference on Document Analysis and Recognition, 2003. Proceedings..

[124]  Yoshua Bengio,et al.  Random Search for Hyper-Parameter Optimization , 2012, J. Mach. Learn. Res..

[125]  Julio Hernandez-Castro,et al.  No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to CAPTCHA Generation , 2017, IEEE Transactions on Information Forensics and Security.

[126]  S.M.J. de Putter,et al.  Verification of concurrent systems in a model-driven engineering workflow , 2019 .

[127]  Ajay Kumar,et al.  Accurate Periocular Recognition Under Less Constrained Environment Using Semantics-Assisted Convolutional Neural Network , 2017, IEEE Transactions on Information Forensics and Security.

[128]  Ben Whitham CANARY FILES: GENERATING FAKE FILES TO DETECT CRITICAL DATA LOSS FROM COMPLEX COMPUTER NETWORKS , 2013 .

[129]  Dennis Guck,et al.  Reliable systems: fault tree analysis via Markov reward automata , 2017 .

[130]  Jiebo Luo,et al.  Robust Image Sentiment Analysis Using Progressively Trained and Domain Transferred Deep Networks , 2015, AAAI.

[131]  Zhenan Sun,et al.  Accurate iris segmentation in non-cooperative environments using fully convolutional networks , 2016, 2016 International Conference on Biometrics (ICB).

[132]  Graham W. Taylor,et al.  Adaptive deconvolutional networks for mid and high level feature learning , 2011, 2011 International Conference on Computer Vision.

[133]  Lance Spitzner,et al.  Honeypots: catching the insider threat , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..

[134]  Gorthi R. K. Sai Subrahmanyam,et al.  Exploring the learning capabilities of convolutional neural networks for robust image watermarking , 2017, Comput. Secur..

[135]  Yoshua Bengio,et al.  Learning Phrase Representations using RNN Encoder–Decoder for Statistical Machine Translation , 2014, EMNLP.

[136]  Ananthram Swami,et al.  Practical Black-Box Attacks against Machine Learning , 2016, AsiaCCS.

[137]  Daisuke Miyamoto,et al.  An Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites , 2008, ICONIP.

[138]  Ananthram Swami,et al.  Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks , 2015, 2016 IEEE Symposium on Security and Privacy (SP).

[139]  Salvatore J. Stolfo,et al.  Bait and Snitch: Defending Computer Systems with Decoys , 2013 .

[140]  Vlado Menkovski,et al.  Towards unsupervised signature extraction of forensic logs , 2017 .

[141]  Jürgen Schmidhuber,et al.  Deep learning in neural networks: An overview , 2014, Neural Networks.

[142]  J. R. Salamanca Tellez,et al.  Coequations and Eilenberg–type Correspondences , 2018 .

[143]  Elena Simperl,et al.  SpotTheLink: A Game-Based Approach to the Alignment of Ontologies , 2012 .

[144]  Waheed Ahmad,et al.  Green computing: efficient energy management of multiprocessor streaming applications via model checking , 2017 .

[145]  Ashish Vaswani,et al.  Supertagging With LSTMs , 2016, NAACL.

[146]  P. A. Inostroza Valdera Structuring languages as object-oriented libraries , 2018 .

[147]  Ananthram Swami,et al.  The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[148]  Michael S. Bernstein,et al.  ImageNet Large Scale Visual Recognition Challenge , 2014, International Journal of Computer Vision.

[149]  Rachel Greenstadt,et al.  Source Code Authorship Attribution Using Long Short-Term Memory Based Networks , 2017, ESORICS.

[150]  Wil M. P. van der Aalst,et al.  Workflow mining: discovering process models from event logs , 2004, IEEE Transactions on Knowledge and Data Engineering.

[151]  Xiaogang Wang,et al.  Deep Learning Face Representation by Joint Identification-Verification , 2014, NIPS.

[152]  Jürgen Schmidhuber,et al.  LSTM: A Search Space Odyssey , 2015, IEEE Transactions on Neural Networks and Learning Systems.

[153]  Salvatore J. Stolfo,et al.  Baiting Inside Attackers Using Decoy Documents , 2009, SecureComm.

[154]  Dawn Xiaodong Song,et al.  Recognizing Functions in Binaries with Neural Networks , 2015, USENIX Security Symposium.

[155]  atherine,et al.  Finding the number of clusters in a data set : An information theoretic approach C , 2003 .

[156]  Ian Goodfellow,et al.  Deep Learning with Differential Privacy , 2016, CCS.

[157]  Ben Whitham,et al.  Design requirements for generating deceptive content to protect document repositories , 2014 .

[158]  Tara N. Sainath,et al.  Deep Neural Networks for Acoustic Modeling in Speech Recognition: The Shared Views of Four Research Groups , 2012, IEEE Signal Processing Magazine.

[159]  Ali Farhadi,et al.  You Only Look Once: Unified, Real-Time Object Detection , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[160]  B. Nordstrom FINITE MARKOV CHAINS , 2005 .

[161]  Risto Vaarandi,et al.  A data clustering algorithm for mining patterns from event logs , 2003, Proceedings of the 3rd IEEE Workshop on IP Operations & Management (IPOM 2003) (IEEE Cat. No.03EX764).

[162]  Julia Hirschberg,et al.  V-Measure: A Conditional Entropy-Based External Cluster Evaluation Measure , 2007, EMNLP.

[163]  Jon Stearley,et al.  What Supercomputers Say: A Study of Five System Logs , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).

[164]  John Langford,et al.  CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.

[165]  Andrew Y. Ng,et al.  Zero-Shot Learning Through Cross-Modal Transfer , 2013, NIPS.

[166]  L. Swartjes,et al.  Model-based design of baggage handling systems , 2018 .

[167]  Richa Singh,et al.  Face Verification via Learned Representation on Feature-Rich Video Frames , 2017, IEEE Transactions on Information Forensics and Security.

[168]  J. Yuill,et al.  Honeyfiles: deceptive files for intrusion detection , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..

[169]  Am Ana Sutii Modularity and reuse of domain-specific languages : an exploration with MetaMod , 2017 .

[170]  Yin Yang,et al.  Functional Mechanism: Regression Analysis under Differential Privacy , 2012, Proc. VLDB Endow..

[171]  Jerry den Hartog,et al.  Towards Creating Believable Decoy Project Folders for Detecting Data Theft , 2016, DBSec.

[172]  Zhenkai Liang,et al.  Neural Nets Can Learn Function Type Signatures From Binaries , 2017, USENIX Security Symposium.

[173]  Hiroshi Fujinoki,et al.  A Survey: Recent Advances and Future Trends in Honeypot Research , 2012 .

[174]  Hongxia Jin,et al.  Privacy-CNH: A Framework to Detect Photo Privacy with Convolutional Neural Network using Hierarchical Features , 2016, AAAI.

[175]  James Bailey,et al.  Information Theoretic Measures for Clusterings Comparison: Variants, Properties, Normalization and Correction for Chance , 2010, J. Mach. Learn. Res..

[176]  Yang Song,et al.  Learning Fine-Grained Image Similarity with Deep Ranking , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.

[177]  Jonas Mueller,et al.  Siamese Recurrent Architectures for Learning Sentence Similarity , 2016, AAAI.

[178]  P. Fiterau-Brostean Active Model Learning for the Analysis of Network Protocols , 2018 .

[179]  Jiangqun Ni,et al.  Deep Learning Hierarchical Representations for Image Steganalysis , 2017, IEEE Transactions on Information Forensics and Security.

[180]  Shengcai Liao,et al.  Multi-label CNN based pedestrian attribute learning for soft biometrics , 2015, 2015 International Conference on Biometrics (ICB).

[181]  Qingshan Liu,et al.  Image retrieval via probabilistic hypergraph ranking , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[182]  Evangelos E. Milios,et al.  A Lightweight Algorithm for Message Type Extraction in System Application Logs , 2012, IEEE Transactions on Knowledge and Data Engineering.

[183]  Joachim M. Buhmann,et al.  Stability-Based Validation of Clustering Solutions , 2004, Neural Computation.

[184]  David Maier,et al.  The Complexity of Some Problems on Subsequences and Supersequences , 1978, JACM.

[185]  Sarmen Keshishzadeh,et al.  Formal analysis and verification of embedded systems for healthcare , 2016 .

[186]  Max Welling,et al.  Auto-Encoding Variational Bayes , 2013, ICLR.

[187]  Masayuki Murata,et al.  Malicious URL sequence detection using event de-noising convolutional neural network , 2017, 2017 IEEE International Conference on Communications (ICC).

[188]  Ryan M. Eustice,et al.  Learning visual feature descriptors for dynamic lighting conditions , 2014, 2014 IEEE/RSJ International Conference on Intelligent Robots and Systems.

[189]  Elena Paslaru Bontas Simperl,et al.  SeaFish: A Game for Collaborative and Visual Image Annotation and Interlinking , 2011, ESWC.

[190]  Julian Fierrez,et al.  Facial Soft Biometrics for Recognition in the Wild: Recent Works, Annotation, and COTS Evaluation , 2018, IEEE Transactions on Information Forensics and Security.

[191]  Jian Sun,et al.  Spatial Pyramid Pooling in Deep Convolutional Networks for Visual Recognition , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[192]  Geoffrey E. Hinton,et al.  Outrageously Large Neural Networks: The Sparsely-Gated Mixture-of-Experts Layer , 2017, ICLR.

[193]  Nikos Komodakis,et al.  Learning to compare image patches via convolutional neural networks , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[194]  A Ali Mehrabi Data structures for analyzing geometric data , 2017 .

[195]  Tieniu Tan,et al.  Exploring complementary features for iris recognition on mobile devices , 2016, 2016 International Conference on Biometrics (ICB).

[196]  Ionut David Run-time resource management for component-based systems , 2016 .

[197]  Elena Paslaru Bontas Simperl,et al.  SpotTheLink: playful alignment of ontologies , 2011, SAC '11.

[198]  Noah A. Smith,et al.  Transition-Based Dependency Parsing with Stack Long Short-Term Memory , 2015, ACL.

[199]  Philip S. Yu,et al.  Sequential Keystroke Behavioral Biometrics for Mobile User Identification via Multi-view Deep Learning , 2017, ECML/PKDD.

[200]  D. Landman,et al.  Reverse engineering source code: Empirical studies of limitations and opportunities , 2017 .

[201]  Qiang Fu,et al.  Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis , 2009, 2009 Ninth IEEE International Conference on Data Mining.

[202]  Feifei Li,et al.  DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning , 2017, CCS.

[203]  Wojciech Zaremba,et al.  An Empirical Exploration of Recurrent Network Architectures , 2015, ICML.

[204]  Dejing Dou,et al.  Differential Privacy Preservation for Deep Auto-Encoders: an Application of Human Behavior Prediction , 2016, AAAI.

[205]  Angelos D. Keromytis,et al.  I am Robot: (Deep) Learning to Break Semantic Image CAPTCHAs , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[206]  Quoc V. Le,et al.  Semi-supervised Sequence Learning , 2015, NIPS.

[207]  Lior Wolf,et al.  I know that voice: Identifying the voice actor behind the voice , 2015, 2015 International Conference on Biometrics (ICB).

[208]  Jiwen Lu,et al.  Single Sample Face Recognition via Learning Deep Supervised Autoencoders , 2015, IEEE Transactions on Information Forensics and Security.

[209]  Reuben A. Farrugia,et al.  Matching Software-Generated Sketches to Face Photographs With a Very Deep CNN, Morphed Faces, and Transfer Learning , 2018, IEEE Transactions on Information Forensics and Security.

[210]  Jürgen Schmidhuber,et al.  Long Short-Term Memory , 1997, Neural Computation.

[211]  Sarah Cobey,et al.  Grants and Awards , 1981, Nursing in critical care.

[212]  Michal Aharon,et al.  One Graph Is Worth a Thousand Logs: Uncovering Hidden Structures in Massive System Event Logs , 2009, ECML/PKDD.

[213]  Eric R. Ziegel,et al.  The Elements of Statistical Learning , 2003, Technometrics.

[214]  Kurt Hornik,et al.  Approximation capabilities of multilayer feedforward networks , 1991, Neural Networks.

[215]  Tao Li,et al.  LogSig: generating system events from raw textual logs , 2011, CIKM '11.

[216]  A. Amighi,et al.  Specification and verification of synchronisation classes in Java : A practical approach , 2018 .

[217]  Giuseppe Ateniese,et al.  Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning , 2017, CCS.

[218]  Evangelos E. Milios,et al.  Clustering event logs using iterative partitioning , 2009, KDD.

[219]  Jian Pei,et al.  A brief survey on sequence classification , 2010, SKDD.

[220]  Enno Jozef Johannes Ruijters Zen and the Art of Railway Maintenance: Analysis and Optimization of Maintenance via Fault Trees and Statistical Model Checking , 2018 .

[221]  Nikolaos Bezirgiannis Abstract behavioral specification: unifying modeling and programming , 2018 .

[222]  Navdeep Jaitly,et al.  Hybrid speech recognition with Deep Bidirectional LSTM , 2013, 2013 IEEE Workshop on Automatic Speech Recognition and Understanding.

[223]  Gert Cauwenberghs,et al.  A Fast Stochastic Error-Descent Algorithm for Supervised Learning and Optimization , 1992, NIPS.

[224]  Milan Petkovic,et al.  Towards a neural language model for signature extraction from forensic logs , 2017, 2017 5th International Symposium on Digital Forensic and Security (ISDFS).