Malware Detection and Prevention System Based on Multi-Stage Rules
暂无分享,去创建一个
Jemal H. Abawajy | Michael Hobbs | Ammar Alazab | Ansam Khraisat | M. Hobbs | J. Abawajy | Ammar Alazab | Ansam Khraisat
[1] Christopher Krügel,et al. Bayesian event classification for intrusion detection , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[2] Earl B. Hunt,et al. Concept learning,: An information processing problem , 1974 .
[3] Kemal Polat,et al. A novel hybrid intelligent method based on C4.5 decision tree classifier and one-against-all approach for multi-class classification problems , 2009, Expert Syst. Appl..
[4] Md. Rafiqul Islam,et al. A multi-tier phishing detection and filtering approach , 2013, J. Netw. Comput. Appl..
[5] Jian Ma,et al. A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering , 2010, Expert Syst. Appl..
[6] Adam Stotz,et al. Understanding multistage attacks by attack-track based visualization of heterogeneous event streams , 2006, VizSEC '06.
[7] Tim Torvatn,et al. Risk of Contract Growth and Opportunistic Behavior: A Comparison of Two Megaprojects , 2012 .
[8] Christian Payne,et al. Towards Usable Application-Oriented Access Controls: Qualitative Results from a Usability Study of SELinux, AppArmor and FBAC-LSM , 2012, Int. J. Inf. Secur. Priv..
[9] David A. Cieslak,et al. A Robust Decision Tree Algorithm for Imbalanced Data Sets , 2010, SDM.
[10] Jemal H. Abawajy,et al. Web application protection against SQL injection attack , 2011, ICIT 2011.
[11] Sara Matzner,et al. An application of machine learning to network intrusion detection , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).
[12] Zhu Wang,et al. A research using hybrid RBF/Elman neural networks for intrusion detection system secure model , 2009, Comput. Phys. Commun..
[13] Jemal H. Abawajy,et al. Using feature selection for intrusion detection system , 2012, 2012 International Symposium on Communications and Information Technologies (ISCIT).
[14] Reza Manabi,et al. Risk Assessment Using AHP in a Petrochemical Engineering Case Study , 2013 .
[15] Hamid R. Nemati. International Journal of Information Security and Privacy , 2007 .
[16] Jemal H. Abawajy,et al. Web Malware that Targets Web Applications , 2013 .
[17] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[18] Jameson M. Wetmore,et al. Encyclopedia of information ethics and security , 2008 .
[19] Sokratis K. Katsikas,et al. Reducing false positives in intrusion detection systems , 2010, Comput. Secur..
[20] Yoram Singer,et al. A simple, fast, and effective rule learner , 1999, AAAI 1999.