CS259D Notes
CS 259D Notes Introduction
Introduction
Botnets
BotFinder
BotMiner
EXPOSURE
Behavioral Biometrics
An Examination of User Behavior for Re-Authentication
Continuous Authentication for Mouse Dynamics A Pattern-Growth Approach
An Efficient User Verification System via Mouse
Touchalytics
Phishing Detection
PILFER
Cantina
Insider Threats
One-Class Training for Masquerade Detection
AnomalyDetection ECM
Intrusion Detection
A-IDS
A Comprehensive Approach to Intrusion Detection Alert Correlation
Web Security
A multi-model approach to the detection of web-based attacks
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks
Deep Packet Inspection and Polymorphism
PAYL
McPAD
Polymorphic Blending Attacks
On the Infeasibility of Modeling Polymorphic Shellcode
Streaming Data and Entropy
Data Streaming Algorithms for Estimating Entropy of Network Traffic
Machine Learning for Security and Security of Machine Learning
Outside the Closed World on Using Machine Learning for Network Intrusion Detection
Challenging the Anomaly Detection Paradigm A Provocative Discussion
The Security of Machine Learning
Powered by
GitBook
Machine Learning for Security and Security of Machine Learning
Machine Learning for Security and Security of Machine Learning
results matching "
"
No results matching "
"