BlackEye: automatic IP blacklisting using machine learning from security logs
暂无分享,去创建一个
[1] Feifei Li,et al. DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning , 2017, CCS.
[2] Phillip A. Porras,et al. Highly Predictive Blacklisting , 2008, USENIX Security Symposium.
[3] Shanchieh Jay Yang,et al. Projecting Cyberattacks Through Variable-Length Markov Models , 2008, IEEE Transactions on Information Forensics and Security.
[4] Kalyan Veeramachaneni,et al. Acquire, adapt, and anticipate: continuous learning to block malicious domains , 2018, 2018 IEEE International Conference on Big Data (Big Data).
[5] Tansel Dökeroglu,et al. Context-sensitive and keyword density-based supervised machine learning techniques for malicious webpage detection , 2018, Soft Computing.
[6] Huimin Lu,et al. Deep adversarial metric learning for cross-modal retrieval , 2019, World Wide Web.
[7] Wenke Lee,et al. A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems , 1999 .
[8] Huimin Lu,et al. Brain Intelligence: Go beyond Artificial Intelligence , 2017, Mobile Networks and Applications.
[9] Baris Coskun,et al. (Un)wisdom of Crowds: Accurately Spotting Malicious IP Clusters Using Not-So-Accurate IP Blacklists , 2017, IEEE Transactions on Information Forensics and Security.
[10] Tanmoy Chakraborty,et al. Phishing URL Detection with Oversampling based on Text Generative Adversarial Networks , 2018, 2018 IEEE International Conference on Big Data (Big Data).
[11] Emiliano De Cristofaro,et al. On collaborative predictive blacklisting , 2018, CCRV.
[12] Brian Hutchinson,et al. Deep Learning for Unsupervised Insider Threat Detection in Structured Cybersecurity Data Streams , 2017, AAAI Workshops.
[13] Yoshua Bengio,et al. Random Search for Hyper-Parameter Optimization , 2012, J. Mach. Learn. Res..
[14] Lawrence K. Saul,et al. Beyond blacklists: learning to detect malicious web sites from suspicious URLs , 2009, KDD.
[15] Huimin Lu,et al. FDCNet: filtering deep convolutional network for marine organism classification , 2018, Multimedia Tools and Applications.
[16] Sumeet Dua,et al. Data Mining and Machine Learning in Cybersecurity , 2011 .
[17] William K. Robertson,et al. Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks , 2013, ACSAC.
[18] Athina Markopoulou,et al. Predictive Blacklisting as an Implicit Recommendation System , 2009, 2010 Proceedings IEEE INFOCOM.
[19] Steven C. H. Hoi,et al. Malicious URL Detection using Machine Learning: A Survey , 2017, ArXiv.
[20] Peter E. Hart,et al. Nearest neighbor pattern classification , 1967, IEEE Trans. Inf. Theory.
[21] Peng Yang,et al. Phishing Website Detection Based on Multidimensional Features Driven by Deep Learning , 2019, IEEE Access.
[22] Huimin Lu,et al. Low illumination underwater light field images reconstruction using deep convolutional neural networks , 2018, Future Gener. Comput. Syst..
[23] Huimin Lu,et al. Ternary Adversarial Networks With Self-Supervision for Zero-Shot Cross-Modal Retrieval , 2020, IEEE Transactions on Cybernetics.
[24] Huimin Lu,et al. Motor Anomaly Detection for Unmanned Aerial Vehicles Using Reinforcement Learning , 2018, IEEE Internet of Things Journal.
[25] Adam Carlson,et al. Modeling network intrusion detection alerts for correlation , 2007, ACM Trans. Inf. Syst. Secur..