Machine learning techniques applied to detect cyber attacks on web applications
暂无分享,去创建一个
[1] Mrinal Kanti Ghose,et al. A Framework for P2P Botnet Detection Using SVM , 2012, 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.
[2] Lukasz Saganowski,et al. Statistical and signal‐based network traffic recognition for anomaly detection , 2012, Expert Syst. J. Knowl. Eng..
[3] Manish Sharma,et al. Pre-clustering algorithm for anomaly detection and clustering that uses variable size buckets , 2012, 2012 1st International Conference on Recent Advances in Information Technology (RAIT).
[4] Philippe Owezarski,et al. Sub-Space clustering, Inter-Clustering Results Association & anomaly correlation for unsupervised network anomaly detection , 2011, 2011 7th International Conference on Network and Service Management.
[5] Gonzalo Álvarez,et al. Application of the Generic Feature Selection Measure in Detection of Web Attacks , 2011, CISIS.
[6] Hongsheng Xi,et al. SAS: semantics aware signature generation for polymorphic worm detection , 2010, International Journal of Information Security.
[7] Jun Ma,et al. Network Anomaly Detection Using Dissimilarity-Based One-Class SVM Classifier , 2009, 2009 International Conference on Parallel Processing Workshops.
[8] Shunzheng Yu,et al. A Novel Model for Detecting Application Layer DDoS Attacks , 2006, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06).
[9] Michael Rohs,et al. BYOD: bring your own device , 2004 .
[10] Daniel P. Huttenlocher,et al. Efficient Graph-Based Image Segmentation , 2004, International Journal of Computer Vision.
[11] Dan Schnackenberg,et al. Statistical approaches to DDoS attack detection and response , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[12] Yiguo Qiao,et al. Anomaly intrusion detection method based on HMM , 2002 .
[13] S. B. Needleman,et al. A general method applicable to the search for similarities in the amino acid sequence of two proteins. , 1970, Journal of molecular biology.
[14] Ashok Kumar,et al. Neural Networks for Fast Estimation of Social Network Centrality Measures , 2015 .
[15] Bartosz Krawczyk,et al. Combined Classifiers with Neural Fuser for Spam Detection , 2012, CISIS/ICEUTE/SOCO Special Sessions.
[16] Michal Choras,et al. Correlation Approach for SQL Injection Attacks Detection , 2012, CISIS/ICEUTE/SOCO Special Sessions.
[17] Krzysztof A. Cyran,et al. Advances in Intelligent and Soft Computing , 2009 .
[18] Wei Li,et al. Using Genetic Algorithm for Network Intrusion Detection , 2004 .
[19] Zheng Zhang,et al. HIDE : a Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification , 2001 .