MACHINE LEARNING APPROACH TO ANOMALY DETECTION IN CYBER SECURITY WITH A CASE STUDY OF SPAMMING ATTACK
暂无分享,去创建一个
[1] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[2] Sachin J. Pukale,et al. A REVIEW OF ANOMALY BASED INTRUSIONS DETECTION IN MULTI-TIER WEB APPLICATIONS , 2012 .
[3] Pollachi Main Road. BEHAVIORAL AND PERFORMANCE ANALYSIS MODEL FOR MALWARE DETECTION TECHNIQUES , 2013 .
[4] Zoubin Ghahramani,et al. An Introduction to Hidden Markov Models and Bayesian Networks , 2001, Int. J. Pattern Recognit. Artif. Intell..
[5] Thomas G. Dietterich,et al. Readings in Machine Learning , 1991 .
[6] Terran Lane,et al. An Application of Machine Learning to Anomaly Detection , 1999 .
[7] Weibo Gong,et al. Anomaly detection using call stack information , 2003, 2003 Symposium on Security and Privacy, 2003..
[8] David A. Wagner,et al. Intrusion detection via static analysis , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[9] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[10] Christopher Krügel,et al. Bayesian event classification for intrusion detection , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[11] Jason Hong,et al. The state of phishing attacks , 2012, Commun. ACM.
[12] A. Christy. INTEGRATION OF FEATURE SETS WITH MACHINE LEARNING TECHNIQUES FOR SPAM FILTERING , 2011 .
[13] J. Ross Quinlan,et al. Induction of Decision Trees , 1986, Machine Learning.
[14] Alfonso Valdes,et al. Adaptive, Model-Based Monitoring for Cyber Attack Detection , 2000, Recent Advances in Intrusion Detection.
[15] S. E. Smaha. Haystack: an intrusion detection system , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.
[16] Sushil Jajodia,et al. Integrating Data Mining Techniques with Intrusion Detection Methods , 1999, DBSec.
[17] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[18] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[19] Anup K. Ghosh,et al. A Study in Using Neural Networks for Anomaly and Misuse Detection , 1999, USENIX Security Symposium.
[20] Julie A. Dickerson,et al. Fuzzy network profiling for intrusion detection , 2000, PeachFuzz 2000. 19th International Conference of the North American Fuzzy Information Processing Society - NAFIPS (Cat. No.00TH8500).