Improving Cyber-Threat Detection by Moving the Boundary Around the Normal Samples
暂无分享,去创建一个
Donato Malerba | Annalisa Appice | Giuseppina Andresini | Francesco Paolo Caforio | D. Malerba | A. Appice | Giuseppina Andresini | Francesco Paolo Caforio
[1] Farrukh Aslam Khan,et al. A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection , 2018, Cluster Computing.
[2] Donato Malerba,et al. Clustering-Aided Multi-View Classification: A Case Study on Android Malware Detection , 2020, Journal of Intelligent Information Systems.
[3] J. C. Dunn,et al. A Fuzzy Relative of the ISODATA Process and Its Use in Detecting Compact Well-Separated Clusters , 1973 .
[4] Kaushik Roy,et al. LSTM for Anomaly-Based Network Intrusion Detection , 2018, 2018 28th International Telecommunication Networks and Applications Conference (ITNAC).
[5] Muhammad Munwar Iqbal,et al. Enhanced Network Anomaly Detection Based on Deep Neural Networks , 2018, IEEE Access.
[6] Sattar Hashemi,et al. Discovering Future Malware Variants By Generating New Malware Samples Using Generative Adversarial Network , 2019, 2019 9th International Conference on Computer and Knowledge Engineering (ICCKE).
[7] Sanjay Chawla,et al. Adversarial Attack, Defense, and Applications with Deep Learning Frameworks , 2019 .
[8] Donato Malerba,et al. Dealing with Class Imbalance in Android Malware Detection by Cascading Clustering and Classification , 2020, Complex Pattern Mining.
[9] Feng Jiang,et al. Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security , 2020, IEEE Transactions on Sustainable Computing.
[10] Daniel S. Berman,et al. A Survey of Deep Learning Methods for Cyber Security , 2019, Inf..
[11] Fei Wang,et al. Sparse Feature Attacks in Adversarial Learning , 2014, IEEE Transactions on Knowledge and Data Engineering.
[12] Xu Chen,et al. Network Intrusion Detection: Based on Deep Hierarchical Network and Original Flow Data , 2019, IEEE Access.
[13] Divya Bansal,et al. Zero-day malware detection , 2016, 2016 Sixth International Symposium on Embedded Computing and System Design (ISED).
[14] Djamal Zeghlache,et al. A Cascade-structured Meta-Specialists Approach for Neural Network-based Intrusion Detection , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[15] John Platt,et al. Probabilistic Outputs for Support vector Machines and Comparisons to Regularized Likelihood Methods , 1999 .
[16] K. Sundarakantham,et al. Machine Learning Based Intrusion Detection System , 2019, 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI).
[17] Akbar Siami Namin,et al. Can Machine/Deep Learning Classifiers Detect Zero-Day Malware with High Accuracy? , 2019, 2019 IEEE International Conference on Big Data (Big Data).
[18] K. P. Soman,et al. Robust Intelligent Malware Detection Using Deep Learning , 2019, IEEE Access.
[19] James C. Bezdek,et al. Pattern Recognition with Fuzzy Objective Function Algorithms , 1981, Advanced Applications in Pattern Recognition.
[20] William A. Gale,et al. A sequential algorithm for training text classifiers , 1994, SIGIR '94.
[21] Ming Zhu,et al. Malware traffic classification using convolutional neural network for representation learning , 2017, 2017 International Conference on Information Networking (ICOIN).
[22] T.C.E. Cheng,et al. Scheduling with Time-Dependent Processing Times 2015 , 2014 .
[23] Jinping Liu,et al. Adaptive intrusion detection via GA-GOGMM-based pattern learning with fuzzy rough set-based attribute selection , 2020, Expert Syst. Appl..
[24] Lizhi Peng,et al. A Signature-Based Assistant Random Oversampling Method for Malware Detection , 2019, 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[25] Panayiotis Kotzanikolaou,et al. Advanced Persistent Threats and Zero-Day Exploits in Industrial Internet of Things , 2019, Security and Privacy Trends in the Industrial Internet of Thing.
[26] Corrado Loglisci,et al. Multi-Channel Deep Feature Learning for Intrusion Detection , 2020, IEEE Access.
[27] David M. W. Powers,et al. Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation , 2011, ArXiv.
[28] K. P. Soman,et al. Deep Learning Approach for Intelligent Intrusion Detection System , 2019, IEEE Access.
[29] Lei Liu,et al. Combining supervised and unsupervised learning for zero-day malware detection , 2013, 2013 Proceedings IEEE INFOCOM.
[30] Yuancheng Li,et al. A Hybrid Malicious Code Detection Method based on Deep Learning , 2015 .
[31] Donato Malerba,et al. A novel spectral-spatial co-training algorithm for the transductive classification of hyperspectral imagery data , 2017, Pattern Recognit..
[32] Miad Faezipour,et al. Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection , 2019, Electronics.
[33] Vladimir Vapnik,et al. Statistical learning theory , 1998 .
[34] Mark Stamp,et al. Detecting malware evolution using support vector machines , 2020, Expert Syst. Appl..
[35] Liang Liu,et al. A Distance-Based Method for Building an Encrypted Malware Traffic Identification Framework , 2019, IEEE Access.
[36] Abdelouahid Derhab,et al. Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues , 2020, Knowl. Based Syst..
[37] Michelangelo Ceci,et al. A relational approach to probabilistic classification in a transductive setting , 2009, Eng. Appl. Artif. Intell..
[38] Chih-Fong Tsai,et al. CANN: An intrusion detection system based on combining cluster centers and nearest neighbors , 2015, Knowl. Based Syst..
[39] Zhisheng Hu,et al. Reinforcement Learning for Adaptive Cyber Defense Against Zero-Day Attacks , 2019, Adversarial and Uncertain Reasoning for Adaptive Cyber Defense.
[40] Lei Shi,et al. MAD-GAN: Multivariate Anomaly Detection for Time Series Data with Generative Adversarial Networks , 2019, ICANN.
[41] Prabaharan Poornachandran,et al. Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Security , 2018, 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT).
[42] Yu Lasheng,et al. Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection , 2018, IEEE Access.
[43] Wenbo Guo,et al. Adversary Resistant Deep Neural Networks with an Application to Malware Detection , 2016, KDD.
[44] Yuefei Zhu,et al. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.
[45] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[46] Julio Gonzalo,et al. A comparison of extrinsic clustering evaluation metrics based on formal constraints , 2008, Information Retrieval.
[47] Anuradha Pillai,et al. Applications of Machine Learning in Cyber Security , 2020, Handbook of Research on Machine and Deep Learning Applications for Cyber Security.
[48] Julian Jang,et al. A survey of emerging threats in cybersecurity , 2014, J. Comput. Syst. Sci..
[49] Corrado Loglisci,et al. Exploiting the Auto-Encoder Residual Error for Intrusion Detection , 2019, 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[50] Sung-Bae Cho,et al. Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders , 2018, Inf. Sci..
[51] Jinoh Kim,et al. An Encoding Technique for CNN-based Network Anomaly Detection , 2018, 2018 IEEE International Conference on Big Data (Big Data).
[52] André C. Drummond,et al. Adaptive anomaly‐based intrusion detection system using genetic algorithm and profiling , 2018, Secur. Priv..
[53] Rytis Maskeliunas,et al. Serious Game iDO: Towards Better Education in Dementia Care , 2019, Inf..
[54] Tao Feng,et al. Statistics-Enhanced Direct Batch Growth Self-Organizing Mapping for Efficient DoS Attack Detection , 2019, IEEE Access.
[55] Wei Liu,et al. A New Method of Fuzzy Support Vector Machine Algorithm for Intrusion Detection , 2020, Applied Sciences.
[56] Lei Zhang,et al. A Structural SVM Based Approach for Binary Classification under Class Imbalance , 2015 .
[57] Pirooz Shamsinejad,et al. Intrusion Detection using a Novel Hybrid Method Incorporating an Improved KNN , 2017 .
[58] Ali A. Ghorbani,et al. Towards a Network-Based Framework for Android Malware Detection and Characterization , 2017, 2017 15th Annual Conference on Privacy, Security and Trust (PST).
[59] Jinlin Wang,et al. Variant Gated Recurrent Units With Encoders to Preprocess Packets for Payload-Aware Intrusion Detection , 2019, IEEE Access.
[60] Christian Igel,et al. Active learning with support vector machines , 2014, WIREs Data Mining Knowl. Discov..
[61] Thi-Thu-Huong Le,et al. The Impact of PCA-Scale Improving GRU Performance for Intrusion Detection , 2019, 2019 International Conference on Platform Technology and Service (PlatCon).
[62] Xiaosong Zhang,et al. An Improved Convolutional Neural Network Model for Intrusion Detection in Networks , 2019, 2019 Cybersecurity and Cyberforensics Conference (CCC).
[63] Peisheng Pan,et al. A Hybrid Intrusion Detection Method Based on Improved Fuzzy C-Means and Support Vector Machine , 2019, 2019 International Conference on Communications, Information System and Computer Engineering (CISCE).
[64] Ananthram Swami,et al. Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks , 2015, 2016 IEEE Symposium on Security and Privacy (SP).
[65] S. Krishnaveni,et al. Anomaly-Based Intrusion Detection System Using Support Vector Machine , 2020, Advances in Intelligent Systems and Computing.
[66] George Karabatis,et al. SDN-GAN: Generative Adversarial Deep NNs for Synthesizing Cyber Attacks on Software Defined Networks , 2019, OTM Workshops.
[67] Yuan Fei,et al. The SVM based on SMO optimization for Speech Emotion Recognition , 2019, 2019 Chinese Control Conference (CCC).
[68] Donato Malerba,et al. Segmentation-aided classification of hyperspectral data using spatial dependency of spectral bands , 2019, ISPRS Journal of Photogrammetry and Remote Sensing.
[69] Chuan Sheng Foo,et al. Adversarially Learned Anomaly Detection , 2018, 2018 IEEE International Conference on Data Mining (ICDM).
[70] Patrick D. McDaniel,et al. Making machine learning robust against adversarial inputs , 2018, Commun. ACM.
[71] Wang Qing,et al. Speech Analysis for Wilson’s Disease Using Genetic Algorithm and Support Vector Machine , 2019 .
[72] Edward Y. Chang,et al. SVM binary classifier ensembles for image classification , 2001, CIKM '01.
[73] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[74] Georg Langs,et al. Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery , 2017, IPMI.
[75] Michal Szczepanik,et al. Malware Detection Using Machine Learning Algorithms and Reverse Engineering of Android Java Code , 2019, International Journal of Network Security & Its Applications.
[76] Sung-Bae Cho,et al. Detecting Intrusive Malware with a Hybrid Generative Deep Learning Model , 2018, IDEAL.
[77] Jack W. Stokes,et al. Detection of Prevalent Malware Families with Deep Learning , 2019, MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM).
[78] Chuan Sheng Foo,et al. Efficient GAN-Based Anomaly Detection , 2018, ArXiv.