CS 259D 《数据挖掘与网络安全》笔记
CS 259D 笔记说明
简介
僵尸网络
BotFinder
BotMiner
EXPOSURE
生物行为信息
An Examination of User Behavior for Re-Authentication
Continuous Authentication for Mouse Dynamics A Pattern-Growth Approach
An Efficient User Verification System via Mouse
Touchalytics
网络钓鱼检测
PILFER
Cantina
内部威胁
One-Class Training for Masquerade Detection
AnomalyDetection ECM
入侵检测
A-IDS
A Comprehensive Approach to Intrusion Detection Alert Correlation
Web 安全
A multi-model approach to the detection of web-based attacks
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks
深度包检测和多态技术
PAYL
McPAD
Polymorphic Blending Attacks
On the Infeasibility of Modeling Polymorphic Shellcode
流数据和信息熵
Data Streaming Algorithms for Estimating Entropy of Network Traffic
Machine Learning for Security and Security of Machine Learning
Outside the Closed World on Using Machine Learning for Network Intrusion Detection
Challenging the Anomaly Detection Paradigm A Provocative Discussion
The Security of Machine Learning
Powered by
GitBook
Machine Learning for Security and Security of Machine Learning
机器学习用于网络安全及其安全问题
results matching "
"
No results matching "
"