Combining Behavior Models to Secure Email Systems
暂无分享,去创建一个
Salvatore J. Stolfo | Ke Wang | Shlomo Hershkop | Wei-Jen Li | Chia-Wei Hu | Olivier Nimeskern | S. Stolfo | Ke Wang | Wei-Jen Li | Shlomo Hershkop | Olivier Nimeskern | Chia-Wei Hu
[1] Thomas G. Dietterich. What is machine learning? , 2020, Archives of Disease in Childhood.
[2] C. Bron,et al. Algorithm 457: finding all cliques of an undirected graph , 1973 .
[3] Stephanie Forrest,et al. Email networks and the spread of computer viruses. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[4] Coenraad Bron,et al. Finding all cliques of an undirected graph , 1973 .
[5] Salvatore J. Stolfo,et al. USENIX Association Proceedings of the FREENIX Track : 2001 USENIX Annual , 2001 .
[6] Salvatore J. Stolfo,et al. Mining Audit Data to Build Intrusion Detection Models , 1998, KDD.
[7] Philip K. Chan,et al. Learning Patterns from Unix Process Execution Traces for Intrusion Detection , 1997 .
[8] Eleazar Eskin,et al. MET: an experimental system for Malicious Email Tracking , 2002, NSPW '02.
[9] Christos Faloutsos,et al. The "DGX" distribution for mining massive, skewed data , 2001, KDD '01.
[10] A. Karr,et al. Computer Intrusion: Detecting Masquerades , 2001 .
[11] M Damashek,et al. Gauging Similarity with n-Grams: Language-Independent Categorization of Text , 1995, Science.
[12] Christos Faloutsos,et al. QBIC project: querying images by content, using color, texture, and shape , 1993, Electronic Imaging.
[13] Pat Langley,et al. Estimating Continuous Distributions in Bayesian Classifiers , 1995, UAI.
[14] Matthew M. Williamson,et al. Throttling viruses: restricting propagation to defeat malicious mobile code , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[15] F. Downton,et al. Introduction to Mathematical Statistics , 1959 .
[16] Eleazar Eskin,et al. A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA , 2002 .