Composite Big Data Modeling for Security Analytics
暂无分享,去创建一个
Yuh-Jong Hu | 胡毓忠 | Win-Nan Wu | Wen-Yu Liu | Y. Hu | Win-Nan Wu | Wen-Yu Liu
[1] Marcus A. Maloof,et al. Machine Learning and Data Mining for Computer Security , 2006 .
[2] Piero A. Bonatti,et al. Datalog for Security, Privacy and Trust , 2010, Datalog.
[3] Pedro M. Domingos. A few useful things to know about machine learning , 2012, Commun. ACM.
[4] Luc De Raedt,et al. ILP turns 20 , 2011, Machine Learning.
[5] Salvatore J. Stolfo,et al. A framework for constructing features and models for intrusion detection systems , 2000, TSEC.
[6] Mohammad Zulkernine,et al. Random-Forests-Based Network Intrusion Detection Systems , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[7] Thomas G. Dietterich,et al. Structured machine learning: the next ten years , 2008, Machine Learning.
[8] Johannes Fürnkranz,et al. Foundations of Rule Learning , 2012, Cognitive Technologies.
[9] Leyla Bilge,et al. Before we knew it: an empirical study of zero-day attacks in the real world , 2012, CCS.
[10] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[11] Thomas Eiter,et al. Rules and Ontologies for the Semantic Web , 2008, Reasoning Web.
[12] Letizia Tanca,et al. What you Always Wanted to Know About Datalog (And Never Dared to Ask) , 1989, IEEE Trans. Knowl. Data Eng..