Scalable attack propagation model and algorithms for honeypot systems
暂无分享,去创建一个
[1] Marc Dacier,et al. Empirical analysis and statistical modeling of attack processes based on honeypots , 2007, ArXiv.
[2] Ramesh R. Sarukkai,et al. Link prediction and path analysis using Markov chains , 2000, Comput. Networks.
[3] Hiroshi Fujinoki,et al. A Survey: Recent Advances and Future Trends in Honeypot Research , 2012 .
[4] Kunle Olukotun,et al. Map-Reduce for Machine Learning on Multicore , 2006, NIPS.
[5] David E. Goldberg,et al. Genetic Algorithms in Search Optimization and Machine Learning , 1988 .
[6] Katerina Goseva-Popstojanova,et al. Characterization and classification of malicious Web traffic , 2014, Comput. Secur..
[7] Sanjay Ghemawat,et al. MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.
[8] Katerina Goseva-Popstojanova,et al. Quantification of Attackers Activities on Servers Running Web 2.0 Applications , 2010, 2010 Ninth IEEE International Symposium on Network Computing and Applications.
[9] Lance Spitzner,et al. The Honeynet Project: Trapping the Hackers , 2003, IEEE Secur. Priv..
[10] David Lou,et al. FOG: Fragment Optimized Growth Algorithm for the de Novo Generation of Molecules Occupying Druglike Chemical Space , 2009, J. Chem. Inf. Model..
[11] Charles M. Grinstead,et al. Introduction to probability , 1999, Statistics for the Behavioural Sciences.
[12] John N. Tsitsiklis,et al. Introduction to Probability , 2002 .
[13] James Newsome,et al. Polygraph: automatically generating signatures for polymorphic worms , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[14] E. Thompson,et al. Multilocus Lod Scores in Large Pedigrees: Combination of Exact and Approximate Calculations , 2007, Human Heredity.
[15] Ming-Yang Su. Internet worms identification through serial episodes mining , 2010, ECTI-CON2010: The 2010 ECTI International Confernce on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology.