Application of Machine Learning and Crowdsourcing to Detection of Cybersecurity Threats
暂无分享,去创建一个
[1] Mark W. Schmidt,et al. Fast Optimization Methods for L1 Regularization: A Comparative Study and Two New Approaches , 2007, ECML.
[2] Charles L. A. Clarke,et al. Efficient and effective spam filtering and re-ranking for large web datasets , 2010, Information Retrieval.
[3] E. Felten,et al. Cross-Site Request Forgeries : Exploitation and Prevention , 2008 .
[4] Lorrie Faith Cranor,et al. School of phish: a real-world evaluation of anti-phishing training , 2009, SOUPS.
[5] Stefan Savage,et al. Spamscatter: Characterizing Internet Scam Hosting Infrastructure , 2007, USENIX Security Symposium.
[6] 資訊工程學系. 3/3_陳英瑞教授_department of computer science , 2011 .
[7] Collin Jackson,et al. Robust defenses for cross-site request forgery , 2008, CCS.
[8] Eugene Fink,et al. Learning of personalized security settings , 2010, 2010 IEEE International Conference on Systems, Man and Cybernetics.