메뉴 건너뛰기




Volumn 7, Issue , 2006, Pages 2669-2672

Machine learning for computer security
[No Author Info available]

Author keywords

Computer security; Encrypted traffic; Images with embedded text; Malicious executables; Network protocols; Spam

Indexed keywords

INTERNET; LEARNING ALGORITHMS; NETWORK PROTOCOLS; SECURITY OF DATA; SPAMMING; TELECOMMUNICATION TRAFFIC;

EID: 33845807389     PISSN: 15324435     EISSN: 15337928     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (36)

References (9)
  • 3
    • 33845804018 scopus 로고    scopus 로고
    • C. Brodley, P. Chan, R. Lippmann, and B. Yurcik, editors. ACM Intl. Conf. Computer and Communications Security (CCS)
    • C. Brodley, P. Chan, R. Lippmann, and B. Yurcik, editors. Workshop Notes of Visualization and Data Mining for Computer Security, 2004. ACM Intl. Conf. Computer and Communications Security (CCS).
    • (2004) Workshop Notes of Visualization and Data Mining for Computer Security
  • 4
    • 33845742256 scopus 로고    scopus 로고
    • P. Chan, V. Kumar, W. Lee, and S. Parthasarathy, editors. IEEE Intl. Conf. Data Mining (ICDM)
    • P. Chan, V. Kumar, W. Lee, and S. Parthasarathy, editors. Workshop Notes of Data Mining for Computer Security, 2003. IEEE Intl. Conf. Data Mining (ICDM).
    • (2003) Workshop Notes of Data Mining for Computer Security
  • 5
    • 33845807390 scopus 로고    scopus 로고
    • Spam filtering based on the analysis of text information embedded into images
    • G. Fumera, I. Pillai, and F. Roll. Spam filtering based on the analysis of text information embedded into images. Journal of Machine Learning Research, 7:2699-2720, 2006.
    • (2006) Journal of Machine Learning Research , vol.7 , pp. 2699-2720
    • Fumera, G.1    Pillai, I.2    Roll, F.3
  • 6
    • 33845768389 scopus 로고    scopus 로고
    • Learning to detect and classify malicious executables in the wild
    • J. Kolter and M. Maloof. Learning to detect and classify malicious executables in the wild. Journal of Machine Learning Research, 7:2721-2744, 2006.
    • (2006) Journal of Machine Learning Research , vol.7 , pp. 2721-2744
    • Kolter, J.1    Maloof, M.2
  • 8
    • 33750332606 scopus 로고    scopus 로고
    • Paragraph: Thwarting signature learning by training maliciously
    • D. Zamboni and C. Kruegel, editors, Berlin. Springer-Verlag
    • J. Newsome, B. Karp, and D. Song. Paragraph: Thwarting signature learning by training maliciously. In D. Zamboni and C. Kruegel, editors, Recent Advances in Intrusion Detection (RAID) 2006 (LNCS 4219), pages 81-105, Berlin, 2006. Springer-Verlag.
    • (2006) Recent Advances in Intrusion Detection (RAID) 2006 (LNCS 4219) , pp. 81-105
    • Newsome, J.1    Karp, B.2    Song, D.3
  • 9
    • 33845735523 scopus 로고    scopus 로고
    • On inferring application protocol behaviors in encrypted network traffic
    • C. Wright, F. Monrose, and G. Masson. On inferring application protocol behaviors in encrypted network traffic. Journal of Machine Learning Research, 7:2745-2769, 2006.
    • (2006) Journal of Machine Learning Research , vol.7 , pp. 2745-2769
    • Wright, C.1    Monrose, F.2    Masson, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.