Big Data Analytics for Sophisticated Attack Detection
暂无分享,去创建一个
[1] Neal Leavitt,et al. Internet Security under Attack: The Undermining of Digital Certificates , 2011, Computer.
[2] Fred Cohen,et al. Computer viruses—theory and experiments , 1990 .
[3] M.E. Locasto,et al. Towards collaborative security and P2P intrusion detection , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[4] Biswanath Mukherjee,et al. A Methodology for Testing Intrusion Detection Systems , 1996, IEEE Trans. Software Eng..
[5] Dorothy E. Denning. Stuxnet: What Has Changed? , 2012, Future Internet.
[6] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[7] Wei-Yang Lin,et al. Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..
[8] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[9] Biswanath Mukherjee,et al. DIDS (distributed intrusion detection system)—motivation, architecture, and an early prototype , 1997 .
[10] Sandro Etalle,et al. N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols , 2012, RAID.
[11] Teresa F. Lunt. Foundations for Intrusion Detection? , 2000, CSFW.
[12] Dimitris Gritzalis,et al. Trusted Computing vs. Advanced Persistent Threats: Can a Defender Win This Game? , 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing.
[13] M. Chung,et al. Simulating Concurrent Intrusionsfor Testing Intrusion Detection Systems : Parallelizing Intrusions , 1995 .
[14] P. Watters,et al. Obfuscation of Stuxnet and Flame Malware , 2012 .
[15] Jaideep Chandrashekar,et al. When Gossip is Good: Distributed Probabilistic Inference for Detection of Slow Network Intrusions , 2006, AAAI.
[16] Susan Young,et al. Anatomy of an Attack , 2003 .
[17] Dimitris Gritzalis,et al. The Big Four - What We Did Wrong in Advanced Persistent Threat Detection? , 2013, 2013 International Conference on Availability, Reliability and Security.
[18] ARAKIS – AN EARLY WARNING AND ATTACK IDENTIFICATION SYSTEM , 2004 .
[19] Vern Paxson,et al. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.