暂无分享,去创建一个
[1] Prabaharan Poornachandran,et al. Scalable Framework for Cyber Threat Situational Awareness Based on Domain Name Systems Data Analysis , 2018 .
[2] Liqing Zhang,et al. Credit Card Fraud Detection Using Convolutional Neural Networks , 2016, ICONIP.
[3] Ankita Kapratwar. Static and Dynamic Analysis for Android Malware Detection , 2016 .
[4] Wei Xu,et al. Session-Based Fraud Detection in Online E-Commerce Transactions Using Recurrent Neural Networks , 2017, ECML/PKDD.
[5] K. P. Soman,et al. Evaluating deep learning approaches to characterize and classify the DGAs at scale , 2018, J. Intell. Fuzzy Syst..
[6] Yong Hu,et al. The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature , 2011, Decis. Support Syst..
[7] K. P. Soman,et al. Evaluating deep learning approaches to characterize and classify malicious URL's , 2018, J. Intell. Fuzzy Syst..
[8] Johan L. Perols. Financial Statement Fraud Detection: An Analysis of Statistical and Machine Learning Algorithms , 2011 .
[9] Martin Knahl,et al. An Autonomous Agent Based Incident Detection System for Cloud Environments , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.
[10] K. P. Soman,et al. Applying convolutional neural network for network intrusion detection , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[11] K. P. Soman,et al. Evaluating shallow and deep networks for ransomware detection and classification , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[12] Yuan Yu,et al. TensorFlow: A system for large-scale machine learning , 2016, OSDI.
[13] K. P. Soman,et al. Applying deep learning approaches for network traffic prediction , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[14] K. P. Soman,et al. Evaluation of Recurrent Neural Network and its Variants for Intrusion Detection System (IDS) , 2017, Int. J. Inf. Syst. Model. Des..
[15] Abdelouahid Derhab,et al. Android Malware Detection using Deep Learning on API Method Sequences , 2017, ArXiv.
[16] K. P. Soman,et al. Deep android malware detection and classification , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[17] K. P. Soman,et al. Detecting malicious domain names using deep learning approaches at scale , 2018, J. Intell. Fuzzy Syst..
[18] K. P. Soman,et al. Long short-term memory based operation log anomaly detection , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[19] Xingquan Zhu,et al. Machine Learning for Android Malware Detection Using Permission and API Calls , 2013, 2013 IEEE 25th International Conference on Tools with Artificial Intelligence.
[20] Sergey Ioffe,et al. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.
[21] Volker Tresp,et al. Fraud detection in communication networks using neural and probabilistic methods , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).
[22] K. P. Soman,et al. Detecting Android malware using Long Short-term Memory (LSTM) , 2018, J. Intell. Fuzzy Syst..
[23] K. P. Soman,et al. Deep encrypted text categorization , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[24] Ruth Breu,et al. Anomaly Detection in the Cloud: Detecting Security Incidents via Machine Learning , 2012, EternalS@ECAI.
[25] K. P. Soman,et al. Secure shell (ssh) traffic analysis with flow based features using shallow and deep networks , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[26] Anazida Zainal,et al. Fraud detection system: A survey , 2016, J. Netw. Comput. Appl..
[27] K. P. Soman,et al. Evaluating effectiveness of shallow and deep networks to intrusion detection system , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[28] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[29] K. P. Soman,et al. Evaluating shallow and deep networks for secure shell (ssh)traffic analysis , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[30] Nitish Srivastava,et al. Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..
[31] Issa M. Khalil,et al. Cloud Computing Security: A Survey , 2014, Comput..