Feature-based transfer learning for network security
暂无分享,去创建一个
[1] Li-Yong Ren,et al. Using data mining to discover signatures in network-based intrusion detection , 2002, Proceedings. International Conference on Machine Learning and Cybernetics.
[2] Diane J. Cook,et al. Transfer Learning across Feature-Rich Heterogeneous Feature Spaces via Feature-Space Remapping (FSR) , 2015, ACM Trans. Intell. Syst. Technol..
[3] Lior Rokach,et al. Unknown malware detection using network traffic classification , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[4] Karel Bartos,et al. Optimized Invariant Representation of Network Traffic for Detecting Unseen Malware Variants , 2016, USENIX Security Symposium.
[5] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[6] Nick Feamster,et al. Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces , 2010, NSDI.
[7] Kate Saenko,et al. Return of Frustratingly Easy Domain Adaptation , 2015, AAAI.
[8] Dong Lin,et al. Network Intrusion Detection and Mitigation Against Denial of Service Attack , 2013 .
[9] Shuiping Gou,et al. Distributed Transfer Network Learning Based Intrusion Detection , 2009, 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications.
[10] Philip S. Yu,et al. Transfer Learning on Heterogenous Feature Spaces via Spectral Transformation , 2010, 2010 IEEE International Conference on Data Mining.
[11] Qiang Yang,et al. A Survey on Transfer Learning , 2010, IEEE Transactions on Knowledge and Data Engineering.
[12] Alfonso Valdes,et al. Adaptive, Model-Based Monitoring for Cyber Attack Detection , 2000, Recent Advances in Intrusion Detection.
[13] Jiawei Han,et al. Knowledge transfer via multiple model local structure mapping , 2008, KDD.