暂无分享,去创建一个
[1] Konrad Rieck,et al. A close look on n-grams in intrusion detection: anomaly detection vs. classification , 2013, AISec.
[2] Carsten Willems,et al. Automatic analysis of malware behavior using machine learning , 2011, J. Comput. Secur..
[3] Hans-Peter Kriegel,et al. LOF: identifying density-based local outliers , 2000, SIGMOD '00.
[4] Marco Ramilli,et al. Return-Oriented Programming , 2012, IEEE Security & Privacy.
[5] Matthias Hauswirth,et al. Accuracy of performance counter measurements , 2009, 2009 IEEE International Symposium on Performance Analysis of Systems and Software.
[6] Neveen I. Ghali,et al. Feature Selection for Effective Anomaly-Based Intrusion Detection , 2009 .
[7] Salvatore J. Stolfo,et al. Unsupervised Anomaly-Based Malware Detection Using Hardware Features , 2014, RAID.
[8] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[9] Elaine J. Weyuker,et al. Monitoring for security intrusion using performance signatures , 2010, WOSP/SIPEW '10.
[10] Shailendra Singh,et al. An ensemble approach for feature selection of Cyber Attack Dataset , 2009, ArXiv.
[11] Salvatore J. Stolfo,et al. On the feasibility of online malware detection with performance counters , 2013, ISCA.
[12] George Ho,et al. PAPI: A Portable Interface to Hardware Performance Counters , 1999 .
[13] Calton Pu,et al. Buffer overflows: attacks and defenses for the vulnerability of the decade , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[14] Eleazar Eskin,et al. A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA , 2002 .
[15] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.