A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
暂无分享,去创建一个
Lalu Banoth | M P Sri Kamal Teja | M Saicharan | N Jaya Chandra | Lalu Banoth | M. S. Teja | M. Saicharan | N. Chandra
[1] Zubair A. Baig. Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks , 2011, Comput. Commun..
[2] Ahmad-Reza Sadeghi,et al. Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[3] Xiaofeng Meng,et al. Safe side effects commitment for OS-level virtualization , 2011, ICAC '11.
[4] Sung-Ryul Kim,et al. A New Logging-based IP Traceback Approach using Data Mining Techniques , 2013, J. Internet Serv. Inf. Secur..
[5] Chao-Tung Yang,et al. Detection workload in a dynamic grid-based intrusion detection environment , 2008, J. Parallel Distributed Comput..
[6] Luis A. Trejo,et al. Analyzing Log Files for Postmortem Intrusion Detection , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[7] Jinshu Su,et al. DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation , 2013, ICT-EurAsia.
[8] Marcus K. Rogers,et al. The future of computer forensics: a needs analysis survey , 2004, Comput. Secur..
[9] Haining Wang,et al. BogusBiter: A transparent protection against phishing attacks , 2010, TOIT.
[10] Junho Choi,et al. Detecting Web based DDoS Attack using MapReduce operations in Cloud Computing Environment , 2013, J. Internet Serv. Inf. Secur..