Big Data for Cybersecurity
暂无分享,去创建一个
Florian Skopik | Giuseppe Settanni | Markus Wurzenberger | Florian Skopik | Markus Wurzenberger | Giuseppe Settanni
[1] Florian Skopik,et al. Collaborative Cyber Threat Intelligence : Detecting and Responding to Advanced Cyber Attacks at the National Level , 2017 .
[2] Seiichi Uchida,et al. A Comparative Evaluation of Unsupervised Anomaly Detection Algorithms for Multivariate Data , 2016, PloS one.
[3] Erhan Guven,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.
[4] Yunhao Liu,et al. Big Data: A Survey , 2014, Mob. Networks Appl..
[5] Chun-Hung Richard Lin,et al. Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..
[6] Colin Tankard,et al. Advanced Persistent threats and how to monitor and deter them , 2011, Netw. Secur..
[7] Karen Scarfone,et al. An analysis of CVSS version 2 vulnerability scoring , 2009, 2009 3rd International Symposium on Empirical Software Engineering and Measurement.
[8] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[9] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[10] Antonio Pescapè,et al. Worm Traffic Analysis and Characterization , 2007, 2007 IEEE International Conference on Communications.
[11] Rui Xu,et al. Survey of clustering algorithms , 2005, IEEE Transactions on Neural Networks.
[12] Jaideep Srivastava,et al. Intrusion Detection: A Survey , 2005 .
[13] David A. Landgrebe,et al. A survey of decision tree classifier methodology , 1991, IEEE Trans. Syst. Man Cybern..
[14] L. Baum,et al. An inequality with applications to statistical estimation for probabilistic functions of Markov processes and to a model for ecology , 1967 .