Exploring and Identifying Malicious Sites in Dark Web Using Machine Learning
暂无分享,去创建一个
[1] Tie-Yan Liu,et al. LightGBM: A Highly Efficient Gradient Boosting Decision Tree , 2017, NIPS.
[2] M. Saar,et al. Thermal damping and retardation in karst conduits , 2014 .
[3] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[4] Ahmad Diab,et al. Darknet and deepnet mining for proactive cybersecurity threat intelligence , 2016, 2016 IEEE Conference on Intelligence and Security Informatics (ISI).
[5] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[6] Harish Karnick,et al. SCDV : Sparse Composite Document Vectors using soft clustering over distributional representations , 2016, EMNLP.
[7] Stephen E. Robertson,et al. Understanding inverse document frequency: on theoretical arguments for IDF , 2004, J. Documentation.
[8] Tomas Mikolov,et al. Enriching Word Vectors with Subword Information , 2016, TACL.
[9] J. Friedman. Greedy function approximation: A gradient boosting machine. , 2001 .
[10] Jeffrey Dean,et al. Distributed Representations of Words and Phrases and their Compositionality , 2013, NIPS.
[11] Paulo Shakarian,et al. DarkEmbed: Exploit Prediction With Neural Language Models , 2018, AAAI.