Detecting malicious URLs using machine learning techniques
暂无分享,去创建一个
Koen Vanhoof | Mario Köppen | Rafael Falcon | Gonzalo Nápoles | Frank Vanhoenshoven | M. Köppen | K. Vanhoof | R. Falcon | G. Nápoles | Frank Vanhoenshoven | Gonzalo Nápoles
[1] M. Verleysen,et al. Classification in the Presence of Label Noise: A Survey , 2014, IEEE Transactions on Neural Networks and Learning Systems.
[2] Lawrence K. Saul,et al. Identifying suspicious URLs: an application of large-scale online learning , 2009, ICML '09.
[3] Lawrence K. Saul,et al. Beyond blacklists: learning to detect malicious web sites from suspicious URLs , 2009, KDD.
[4] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[5] Nir Friedman,et al. Bayesian Network Classifiers , 1997, Machine Learning.
[6] Senén Barro,et al. Do we need hundreds of classifiers to solve real world classification problems? , 2014, J. Mach. Learn. Res..
[7] Andreas Christmann,et al. Support vector machines , 2008, Data Mining and Knowledge Discovery Handbook.
[8] Min-Yen Kan,et al. Fast webpage classification using URL features , 2005, CIKM '05.
[9] Grigorios Tsoumakas,et al. Multi-Label Classification: An Overview , 2007, Int. J. Data Warehous. Min..
[10] Thorsten Joachims,et al. Transductive Inference for Text Classification using Support Vector Machines , 1999, ICML.
[11] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[12] Ramana Rao Kompella,et al. PhishNet: Predictive Blacklisting to Detect Phishing Attacks , 2010, 2010 Proceedings IEEE INFOCOM.
[13] Hava T. Siegelmann,et al. Support Vector Clustering , 2002, J. Mach. Learn. Res..
[14] Francisco Herrera,et al. An insight into classification with imbalanced data: Empirical results and current trends on using data intrinsic characteristics , 2013, Inf. Sci..
[15] Juan Julián Merelo Guervós,et al. An Improved Decision System for URL Accesses Based on a Rough Feature Selection Technique , 2016, Recent Advances in Computational Intelligence in Defense and Security.
[16] Nicu Sebe,et al. Semisupervised learning of classifiers: theory, algorithms, and their application to human-computer interaction , 2004, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[17] Brendan J. Frey,et al. Are Random Forests Truly the Best Classifiers? , 2016, J. Mach. Learn. Res..
[18] Francisco Herrera,et al. Self-labeled techniques for semi-supervised learning: taxonomy, software and empirical study , 2015, Knowledge and Information Systems.
[19] J. Orbach. Principles of Neurodynamics. Perceptrons and the Theory of Brain Mechanisms. , 1962 .
[20] Shigeo Abe DrEng. Pattern Classification , 2001, Springer London.
[21] Juan Julián Merelo Guervós,et al. Going a Step Beyond the Black and White Lists for URL Accesses in the Enterprise by Means of Categorical Classifiers , 2014, IJCCI.
[22] Andrew K. C. Wong,et al. Classification of Imbalanced Data: a Review , 2009, Int. J. Pattern Recognit. Artif. Intell..
[23] Aurélien Garivier,et al. On the Complexity of Best-Arm Identification in Multi-Armed Bandit Models , 2014, J. Mach. Learn. Res..
[24] Monika Henzinger,et al. Purely URL-based topic classification , 2009, WWW '09.
[25] Justin Tung Ma,et al. Learning to detect malicious URLs , 2011, TIST.
[26] Steven C. H. Hoi,et al. Cost-sensitive online active learning with application to malicious URL detection , 2013, KDD.
[27] Peter E. Hart,et al. Nearest neighbor pattern classification , 1967, IEEE Trans. Inf. Theory.