Building a Machine Learning Model for the SOC, by the Input from the SOC, and Analyzing it for the SOC
暂无分享,去创建一个
Awalin Sopan | Matthew Berninger | Murali Mulakaluri | Raj Katakam | Awalin Sopan | Matthew Berninger | Murali Mulakaluri | Raj Katakam
[1] Erhan Guven,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.
[2] Lisa Singh,et al. G-PARE: A visual analytic tool for comparative analysis of uncertain graphs , 2011, 2011 IEEE Conference on Visual Analytics Science and Technology (VAST).
[3] David H. Tobey,et al. Enhancing the Cybersecurity Workforce , 2011, IT Professional.
[4] Yindalon Aphinyanagphongs,et al. A Workflow for Visual Diagnostics of Binary Classifiers using Instance-Level Explanations , 2017, 2017 IEEE Conference on Visual Analytics Science and Technology (VAST).
[5] Jarke J. van Wijk,et al. Understanding the context of network traffic alerts , 2016, 2016 IEEE Symposium on Visualization for Cyber Security (VizSec).
[6] Arun Lakhotia,et al. Malware and Machine Learning , 2015, Intelligent Methods for Cyber Warfare.
[7] Ajmal Mian,et al. Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey , 2018, IEEE Access.
[8] Avi Goldfarb,et al. Prediction Machines: The Simple Economics of Artificial Intelligence , 2018 .
[9] Andrew M'manga,et al. Folk Risk Analysis: Factors Influencing Security Analysts' Interpretation of Risk , 2017, SOUPS.
[10] Giuseppe Santucci,et al. The goods, the bads and the uglies: Supporting decisions in malware detection through visual analytics , 2017, 2017 IEEE Symposium on Visualization for Cyber Security (VizSec).
[11] Min Chen,et al. An Analysis of Machine- and Human-Analytics in Classification , 2017, IEEE Transactions on Visualization and Computer Graphics.