-
2
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
SP '01, Washington, DC, USA
-
Schultz MG, Eskin E, Zadok E, Stolfo SJ (2001) Data mining methods for detection of new malicious executables. In: Proceedings of the 2001 IEEE symposium on security and privacy, SP '01, Washington, DC, USA, pp 38.
-
(2001)
Proceedings of the 2001 IEEE symposium on security and privacy
, pp. 38
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, E.3
Stolfo, S.J.4
-
3
-
-
18844362133
-
N-gram-based detection of new malicious code
-
IEEE Computer Society, Washington, DC
-
Abou-Assaleh T, Cercone N, Keselj V, Sweidan R (2004) N-gram-based detection of new malicious code. In: Proceedings of the 28th annual international computer software and applications conference-workshops and fast abstracts, COMPSAC '04, vol 02. IEEE Computer Society, Washington, DC, pp 41-42.
-
(2004)
Proceedings of the 28th annual international computer software and applications conference-workshops and fast abstracts, COMPSAC '04
, vol.2
, pp. 41-42
-
-
Abou-Assaleh, T.1
Cercone, N.2
Keselj, V.3
Sweidan, R.4
-
4
-
-
33845768389
-
Learning to detect and classify malicious executables in the wild
-
Zico Kolter J, Maloof MA (2006) Learning to detect and classify malicious executables in the wild. J Mach Learn Res.
-
(2006)
J Mach Learn Res
-
-
Zico Kolter, J.1
Maloof, M.A.2
-
5
-
-
0742276097
-
Inside the slammer worm
-
Moore D, Paxson V, Savage S, Shannon C, Staniford S, Weaver N (2003) Inside the slammer worm. Security Privacy IEEE 1(4): 33-39.
-
(2003)
Security Privacy IEEE
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
6
-
-
42749086128
-
Detection of unknown computer worms based on behavioral classification of the host
-
Moskovitch R, Elovici Y, Rokach L (2008) Detection of unknown computer worms based on behavioral classification of the host. Comput Stat Data Anal 52(9): 4544-4566.
-
(2008)
Comput Stat Data Anal
, vol.52
, Issue.9
, pp. 4544-4566
-
-
Moskovitch, R.1
Elovici, Y.2
Rokach, L.3
-
7
-
-
58549090885
-
Improving malware detection by applying multi-inducer ensemble
-
Menahem E, Shabtai A, Rokach L, Elovici Y (2009) Improving malware detection by applying multi-inducer ensemble. Comput Stat Data Anal 53(4): 1483-1494.
-
(2009)
Comput Stat Data Anal
, vol.53
, Issue.4
, pp. 1483-1494
-
-
Menahem, E.1
Shabtai, A.2
Rokach, L.3
Elovici, Y.4
-
8
-
-
70350619738
-
Unknown malcode detection and the imbalance problem
-
doi: 10. 1007/s11416-009-0122-8
-
Moskovitch R, Stopel D, Feher C, Nissim N, Japkowicz N, Elovici Y (2009) Unknown malcode detection and the imbalance problem. J Comput Virol 5: 295-308. doi: 10. 1007/s11416-009-0122-8.
-
(2009)
J Comput Virol
, vol.5
, pp. 295-308
-
-
Moskovitch, R.1
Stopel, D.2
Feher, C.3
Nissim, N.4
Japkowicz, N.5
Elovici, Y.6
-
9
-
-
17644421307
-
Recent worms: a survey and trends
-
WORM '03, ACM, New York
-
Kienzle DM, MC Elder (2003) Recent worms: a survey and trends. In: Proceedings of the 2003 ACM workshop on Rapid malcode, WORM '03, ACM, New York, pp 1-10.
-
(2003)
Proceedings of the 2003 ACM workshop on Rapid malcode
, pp. 1-10
-
-
Kienzle, D.M.1
Elder, M.C.2
-
10
-
-
0141762461
-
Code-red: a case study on the spread and victims of an internet worm
-
IMW '02, ACM, New York
-
Moore D, Shannon C, Claffy K (2002) Code-red: a case study on the spread and victims of an internet worm. In: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, IMW '02, ACM, New York, pp 273-284.
-
(2002)
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
, pp. 273-284
-
-
Moore, D.1
Shannon, C.2
Claffy, K.3
-
11
-
-
12244311689
-
A taxonomy of computer worms
-
WORM '03, ACM, New York
-
Weaver N, Paxson V, Staniford S, Cunningham R (2003) A taxonomy of computer worms. In: Proceedings of the 2003 ACM workshop on Rapid malcode, WORM '03, ACM, New York, pp 11-18.
-
(2003)
Proceedings of the 2003 ACM workshop on Rapid malcode
, pp. 11-18
-
-
Weaver, N.1
Paxson, V.2
Staniford, S.3
Cunningham, R.4
-
12
-
-
84867889389
-
-
Cert (Online; Accessed 23 July 2012)
-
Cert (2000) Multiple denial-of-Service problems in ISC BIND. http://www. cert. org/advisories/CA-2000-20. html. (Online; Accessed 23 July 2012).\
-
(2000)
Multiple denial-of-Service problems in ISC BIND
-
-
-
13
-
-
0032676506
-
A data mining framework for building intrusion detection models
-
Lee W, Stolfo SJ, Mok KW (1999) A data mining framework for building intrusion detection models. In: Security and Privacy, 1999, Proceedings of the 1999 IEEE Symposium, pp 120-132.
-
(1999)
Security and Privacy 1999, Proceedings of the 1999 IEEE Symposium
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
14
-
-
34249865012
-
Research on intrusion detection and response: a survey
-
P Kabiri, Ghorbani Ali A (2005) Research on intrusion detection and response: a survey. Int J Netw Security 1: 84-102.
-
(2005)
Int J Netw Security
, vol.1
, pp. 84-102
-
-
Peyman, K.1
Ghorbani Ali, A.2
-
16
-
-
2442526701
-
Unsupervised learning techniques for an intrusion detection system
-
SAC '04, ACM, New York, NY, USA
-
Zanero S, Savaresi SM (2004) Unsupervised learning techniques for an intrusion detection system. In: Proceedings of the 2004 ACM symposium on applied computing, SAC '04, ACM, New York, NY, USA, pp 412-419.
-
(2004)
Proceedings of the 2004 ACM symposium on applied computing
, pp. 412-419
-
-
Zanero, S.1
Savaresi, S.M.2
-
18
-
-
4544251643
-
Network intrusion detection using an improved competitive learning neural network
-
second annual conference
-
Lei JZ, Ghorbani A (2004) Network intrusion detection using an improved competitive learning neural network. In: Communication networks and services research, 2004, Proceedings. second annual conference, pp 190-197.
-
(2004)
Communication networks and services research, 2004, Proceedings
, pp. 190-197
-
-
Lei, J.Z.1
Ghorbani, A.2
-
19
-
-
70350139996
-
Using artificial neural networks to detect unknown computer worms
-
Stopel D, Moskovitch R, Boger Z, Shahar Y, Elovici Y (2009) Using artificial neural networks to detect unknown computer worms. Neural Comput Appl 18: 663-674.
-
(2009)
Neural Comput Appl
, vol.18
, pp. 663-674
-
-
Stopel, D.1
Moskovitch, R.2
Boger, Z.3
Shahar, Y.4
Elovici, Y.5
-
21
-
-
0033681199
-
Fuzzy network profiling for intrusion detection
-
19th International Conference of the North American
-
Dickerson JE, Dickerson JA (2000) Fuzzy network profiling for intrusion detection. In: Fuzzy Information Processing Society, NAFIPS, 19th International Conference of the North American, pp 301-306.
-
(2000)
Fuzzy Information Processing Society, NAFIPS
, pp. 301-306
-
-
Dickerson, J.E.1
Dickerson, J.A.2
-
22
-
-
3042514639
-
Associate Professor and Associate Professor Fuzzy data mining and genetic algorithms applied to intrusion detection
-
(NISSC)
-
Bridges SM, Vaughn RB (2000) Associate Professor and Associate Professor Fuzzy data mining and genetic algorithms applied to intrusion detection. In: Proceedings of the national information systems security conference (NISSC), pp 6-19.
-
(2000)
Proceedings of the national information systems security conference
, pp. 6-19
-
-
Bridges, S.M.1
Vaughn, R.B.2
-
23
-
-
0038103911
-
Utilising fuzzy logic and trend analysis for effective intrusion detection
-
Botha M, von Solms R (2003) Utilising fuzzy logic and trend analysis for effective intrusion detection. Comput Amp Security 22(5): 423-434.
-
(2003)
Comput Amp Security
, vol.22
, Issue.5
, pp. 423-434
-
-
Botha, M.1
von Solms, R.2
-
24
-
-
0001341901
-
-
Technical Report, Cambridge, MA, USA
-
Cohn DA, Ghahramani Z, Jordan MI (1995) Active learning with statistical models. Technical Report, Cambridge, MA, USA.
-
(1995)
Active learning with statistical models
-
-
Cohn, D.A.1
Ghahramani, Z.2
Jordan, M.I.3
-
25
-
-
85013879626
-
A sequential algorithm for training text classifiers
-
SIGIR '94, New York, NY, USA. Springer-Verlag New York, Inc, New York
-
Lewis DD, Gale WA (1994) A sequential algorithm for training text classifiers. In: Proceedings of the 17th annual international ACM SIGIR conference on research and development in information retrieval, SIGIR '94, New York, NY, USA. Springer-Verlag New York, Inc, New York, pp 3-12.
-
(1994)
Proceedings of the 17th annual international ACM SIGIR conference on research and development in information retrieval
, pp. 3-12
-
-
Lewis, D.D.1
Gale, W.A.2
-
26
-
-
0442319140
-
Toward optimal active learning through sampling estimation of error reduction
-
ICML '01. Morgan Kaufmann Publishers Inc, San Francisco
-
Roy N, McCallum A (2001) Toward optimal active learning through sampling estimation of error reduction. In: Proceedings of the eighteenth international conference on machine learning, ICML '01. Morgan Kaufmann Publishers Inc, San Francisco, pp 441-448.
-
(2001)
Proceedings of the eighteenth international conference on machine learning
, pp. 441-448
-
-
Roy, N.1
McCallum, A.2
-
27
-
-
84880757496
-
Active cost-sensitive learning
-
Margineantu DD (2005) Active cost-sensitive learning. In: IJCAI, pp 1622-1613.
-
(2005)
IJCAI
, pp. 1613-1622
-
-
Margineantu, D.D.1
-
28
-
-
84867864566
-
-
Technical Report UCB/CSD-00-1093, EECS Department, University of California, Berkele
-
Lorch JR, AJ Smith (2000) Building vtrace, a tracer for windows nt and windows 2000. Technical Report UCB/CSD-00-1093, EECS Department, University of California, Berkeley.
-
(2000)
Building vtrace, a tracer for windows nt and windows 2000
-
-
Lorch, J.R.1
Smith, A.J.2
-
29
-
-
84990303629
-
Witten ih, frank e: data mining: practical machine learning tools and techniques
-
Francisco A (2006) Witten ih, frank e: data mining: practical machine learning tools and techniques. BioMed Eng OnLine 5: 1-2.
-
(2006)
BioMed Eng OnLine
, vol.5
, pp. 1-2
-
-
Francisco, A.1
-
30
-
-
70349826365
-
C4. 5: programs for machine learning
-
San Francisco, CA, USA
-
Ross Quinlan J (1993) C4. 5: programs for machine learning. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA.
-
(1993)
Morgan Kaufmann Publishers Inc
-
-
Ross Quinlan, J.1
-
32
-
-
46149134436
-
Fusion propagation, and structuring in belief networks
-
Pearl J (1986) Fusion propagation, and structuring in belief networks. Artif Intel 29(3): 241-288.
-
(1986)
Artif Intel
, vol.29
, Issue.3
, pp. 241-288
-
-
Pearl, J.1
-
33
-
-
33646887241
-
Selective voting-getting more for less in sensor fusion
-
Lior R, Oded M, Reuven A (2006) Selective voting-getting more for less in sensor fusion. IJPRAI 20(3): 329-350.
-
(2006)
Ijprai
, vol.20
, Issue.3
, pp. 329-350
-
-
Lior, R.1
Oded, M.2
Reuven, A.3
-
34
-
-
34547761741
-
A methodology for improving the performance of non-ranker feature selection filters
-
Lior R, Barak C, Oded M (2007) A methodology for improving the performance of non-ranker feature selection filters. IJPRAI 21(5): 809-830.
-
(2007)
Ijprai
, vol.21
, Issue.5
, pp. 809-830
-
-
Lior, R.1
Barak, C.2
Oded, M.3
-
35
-
-
49549094278
-
Negation recognition in medical narrative reports
-
Rokach L, Romano R, Maimon O (2008) Negation recognition in medical narrative reports. Inf Retrieval 11(6): 499-538.
-
(2008)
Inf Retrieval
, vol.11
, Issue.6
, pp. 499-538
-
-
Rokach, L.1
Romano, R.2
Maimon, O.3
-
36
-
-
0026966646
-
A training algorithm for optimal margin classifiers
-
COLT '92, ACM, New York
-
Boser BE, Guyon IM, Vapnik VN (1992) A training algorithm for optimal margin classifiers. In: Proceedings of the fifth annual workshop on Computational learning theory, COLT '92, ACM, New York, pp 144-152.
-
(1992)
Proceedings of the fifth annual workshop on Computational learning theory
, pp. 144-152
-
-
Boser, B.E.1
Guyon, I.M.2
Vapnik, V.N.3
-
38
-
-
27144489164
-
A tutorial on support vector machines for pattern recognition
-
CJC Burges (1998) A tutorial on support vector machines for pattern recognition. Data Min Knowl Discov 2(2): 121-167.
-
(1998)
Data Min Knowl Discov
, vol.2
, Issue.2
, pp. 121-167
-
-
Burges, C.J.C.1
-
39
-
-
0000874557
-
Theoretical foundations of the potential function method in pattern recognition learning
-
Aizerman A, Braverman EM, LI Rozoner (1964) Theoretical foundations of the potential function method in pattern recognition learning. Automat Remote Control 25: 821-837.
-
(1964)
Automation Remote Control
, vol.25
, pp. 821-837
-
-
Aizerman, A.1
Braverman, E.M.2
Rozoner, L.I.3
-
41
-
-
51349109687
-
Detecting worms via mining dynamic program execution
-
Third International Conference
-
Wang X, Yu W, Champion A,Xinwen F,Dong Xuan (2007) Detecting worms via mining dynamic program execution. In: Security and Privacy in Communications Networks and the Workshops, 2007. SecureComm 2007. Third International Conference, pp 412 -421.
-
(2007)
Security and Privacy in Communications Networks and the Workshops, 2007. SecureComm 2007
, pp. 412-421
-
-
Wang, X.1
Yu, W.2
Champion, A.3
Xinwen, F.4
Dong, X.5
-
42
-
-
38049178750
-
Feature based techniques for auto-detection of novel email worms
-
PAKDD'07. Springer, Berlin
-
Masud MM, Khan L, Thuraisingham B (2007) Feature based techniques for auto-detection of novel email worms. In: Proceedings of the 11th Pacific-Asia conference on advances in knowledge discovery and data mining, PAKDD'07. Springer, Berlin, pp 205-216.
-
(2007)
Proceedings of the 11th Pacific-Asia conference on advances in knowledge discovery and data mining
, pp. 205-216
-
-
Masud, M.M.1
Khan, L.2
Thuraisingham, B.3
-
43
-
-
38149023532
-
Improving the detection of unknown computer worms activity using active learning
-
KI '07. Springer, Berlin, Heidelberg
-
Moskovitch R, Nissim N, Stopel D, Feher C, Englert R, Elovici Y (2007) Improving the detection of unknown computer worms activity using active learning. In: Proceedings of the 30th annual German conference on advances in artificial intelligence, KI '07. Springer, Berlin, Heidelberg, pp 489-493.
-
(2007)
Proceedings of the 30th annual German conference on advances in artificial intelligence
, pp. 489-493
-
-
Moskovitch, R.1
Nissim, N.2
Stopel, D.3
Feher, C.4
Englert, R.5
Elovici, Y.6
-
45
-
-
67650251631
-
Malicious code detection using active learning
-
Bonchi F, Ferrari E, Jiang W, Malin B (eds) Springer, Berlin, Heidelberg
-
Moskovitch R, Nissim N, Elovici Y (2009) Malicious code detection using active learning. In: Bonchi F, Ferrari E, Jiang W, Malin B (eds) Privacy, Security, and Trust in KDD. Lecture notes in computer science, vol 5456, pp 74-91. Springer, Berlin, Heidelberg.
-
(2009)
Privacy, Security, and Trust in KDD. Lecture notes in computer science
, vol.5456
, pp. 74-91
-
-
Moskovitch, R.1
Nissim, N.2
Elovici, Y.3
-
46
-
-
2542488394
-
Servedio smooth boosting and learning with malicious noise
-
Rocco A (2003) Servedio smooth boosting and learning with malicious noise J Mach Learn Res 4: 633-648.
-
(2003)
J Mach Learn Res
, vol.4
, pp. 633-648
-
-
Rocco, A.1
-
47
-
-
70449369080
-
Co-training semi-supervised active learning algorithm based on noise filter
-
IEEE Computer Society, Washington, DC, USA
-
Chen Y, Zhan Y (2009) Co-training semi-supervised active learning algorithm based on noise filter. In: Proceedings of the 2009 WRI global congress on intelligent systems, GCIS '09, vol 03. IEEE Computer Society, Washington, DC, USA, pp 524-528.
-
(2009)
Proceedings of the 2009 WRI global congress on intelligent systems, GCIS '09
, vol.3
, pp. 524-528
-
-
Chen, Y.1
Zhan, Y.2
-
49
-
-
2942731012
-
An extensive empirical study of feature selection metrics for text classification
-
Forman G (2003) An extensive empirical study of feature selection metrics for text classification. J Mach Learn Res.
-
(2003)
J Mach Learn Res
-
-
Forman, G.1
|