Tracking Cyber Adversaries with Adaptive Indicators of Compromise
暂无分享,去创建一个
Conrad D. James | Joe B. Ingram | James B. Aimone | Jonathan A. Cox | Kevin R. Dixon | Justin E. Doak | Sam A. Mulder | John H. Naegle | David R. Follett | K. R. Dixon | C. James | J. Aimone | Jonathan A. Cox | S. Mulder | D. Follett | J. Ingram | J. Naegle | J. Doak
[1] S C Kleene,et al. Representation of Events in Nerve Nets and Finite Automata , 1951 .
[2] Eric Medvet,et al. Playing regex golf with genetic programming , 2014, GECCO.
[3] Shaolei Ren,et al. Game Theory for Cyber Security and Privacy , 2017, ACM Comput. Surv..
[4] Alexander Zien,et al. Semi-Supervised Learning , 2006 .
[5] Conrad D. James,et al. Neuromorphic data microscope , 2017, NCS.
[6] Dave Brown,et al. Supplementary Material for An Efficient and Scalable Semiconductor Architecture for Parallel Automata Processing , 2013 .
[7] Angelos D. Keromytis,et al. Back in Black: Towards Formal, Black Box Analysis of Sanitizers and Filters , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[8] Patrick Crowley,et al. Extending finite automata to efficiently match Perl-compatible regular expressions , 2008, CoNEXT '08.
[9] Tobias Scheffer,et al. Learning to identify concise regular expressions that describe email campaigns , 2015, J. Mach. Learn. Res..