-
1
-
-
85043201839
-
Scalable, behavior-based malware clustering
-
U. Bayer, P. M. Comparetti, C. H. C. Kruegel, and E. Kirda. Scalable, behavior-based malware clustering. In NDSS, 2009.
-
(2009)
NDSS
-
-
Bayer, U.1
Comparetti, P.M.2
Kruegel, C.H.C.3
Kirda, E.4
-
2
-
-
80053015779
-
Bagging classifiers for fighting poisoning attacks in adversarial classification tasks
-
Springer Berlin Heidelberg
-
B. Biggio, I. Corona, and G. Fumera. Bagging classifiers for fighting poisoning attacks in adversarial classification tasks. In Multiple Classifier Systems, pages 350-359. Springer Berlin Heidelberg, 2011.
-
(2011)
Multiple Classifier Systems
, pp. 350-359
-
-
Biggio, B.1
Corona, I.2
Fumera, G.3
-
8
-
-
50249170401
-
Casting out demons: Sanitizing training data for anomaly sensors
-
IEEE
-
G. F. Cretu, A. Stavrou, M. E. Locasto, S. J. Stolfo, and A. D. Keromytis. Casting out demons: Sanitizing training data for anomaly sensors. In Security and Privacy, 2008. SP 2008. IEEE Symposium on, pages 81-95. IEEE, 2008.
-
(2008)
Security and Privacy, 2008. SP 2008. IEEE Symposium on
, pp. 81-95
-
-
Cretu, G.F.1
Stavrou, A.2
Locasto, M.E.3
Stolfo, S.J.4
Keromytis, A.D.5
-
9
-
-
85076498355
-
ZOZZLE: Fast and precise in-browser JavaScript malware detection
-
Berkeley, CA, USA, USENIX Association
-
C. Curtsinger, B. Livshits, B. Zorn, and C. Seifert. ZOZZLE: Fast and precise in-browser JavaScript malware detection. In Proceedings of the 20th USENIX conference on Security, SEC'11, pages 3-3, Berkeley, CA, USA, 2011. USENIX Association.
-
(2011)
Proceedings of the 20th USENIX Conference on Security, SEC'11
, pp. 3
-
-
Curtsinger, C.1
Livshits, B.2
Zorn, B.3
Seifert, C.4
-
10
-
-
12244295760
-
Adversarial classification
-
New York, New York, USA, ACM Press
-
N. Dalvi, P. Domingos, S. Sanghai, and D. Verma. Adversarial classification. In Proceedings of the 2004 ACM SIGKDD international conference on Knowledge discovery and data mining KDD 04 (2004), page 99, New York, New York, USA, 2004. ACM Press.
-
(2004)
Proceedings of the 2004 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining KDD 04 (2004)
, pp. 99
-
-
Dalvi, N.1
Domingos, P.2
Sanghai, S.3
Verma, D.4
-
11
-
-
84878355718
-
Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail
-
Washington, DC, USA, IEEE Computer Society
-
K. P. Dyer, S. E. Coull, T. Ristenpart, and T. Shrimpton. Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail. In Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP '12, pages 332-346, Washington, DC, USA, 2012. IEEE Computer Society.
-
(2012)
Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP '12
, pp. 332-346
-
-
Dyer, K.P.1
Coull, S.E.2
Ristenpart, T.3
Shrimpton, T.4
-
12
-
-
50949133669
-
LIBLINEAR: A Library for Large Linear Classification
-
R. Fan, K. Chang, C. Hsieh, X. Wang, and Lin. LIBLINEAR : A Library for Large Linear Classification. The Journal of Machine Learning Research, 9(2008):1871-1874, 2008.
-
(2008)
The Journal of Machine Learning Research
, vol.9
, Issue.2008
, pp. 1871-1874
-
-
Fan, R.1
Chang, K.2
Hsieh, C.3
Wang, X.4
Lin5
-
15
-
-
66549101391
-
An empirical study of malware evolution
-
A. Gupta, P. Kuppili, A. Akella, and P. Barford. An empirical study of malware evolution. In First International Communication Systems and Networks and Workshops (COMSNETS 2009), pages 1-10, 2009.
-
(2009)
First International Communication Systems and Networks and Workshops (COMSNETS 2009)
, pp. 1-10
-
-
Gupta, A.1
Kuppili, P.2
Akella, A.3
Barford, P.4
-
16
-
-
0036505670
-
A comparison of methods for multiclass support vector machines
-
C.-W. Hsu and C.-J. Lin. A comparison of methods for multiclass support vector machines. Neural Networks, IEEE Transactions on, 13(2):415-425, 2002.
-
(2002)
Neural Networks, IEEE Transactions on
, vol.13
, Issue.2
, pp. 415-425
-
-
Hsu, C.-W.1
Lin, C.-J.2
-
17
-
-
80955143573
-
Adversarial machine learning
-
New York, NY, USA, ACM
-
L. Huang, A. D. Joseph, B. Nelson, B. I. Rubinstein, and J. D. Tygar. Adversarial machine learning. In Proceedings of the 4th ACM workshop on Security and artificial intelligence, AISec '11, pages 43-58, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, AISec '11
, pp. 43-58
-
-
Huang, L.1
Joseph, A.D.2
Nelson, B.3
Rubinstein, B.I.4
Tygar, J.D.5
-
18
-
-
77956245055
-
Quality management on Amazon Mechanical Turk
-
New York, NY, USA, ACM
-
P. G. Ipeirotis, F. Provost, and J. Wang. Quality management on Amazon Mechanical Turk. In Proceedings of the ACM SIGKDD Workshop on Human Computation, HCOMP '10, pages 64-67, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the ACM SIGKDD Workshop on Human Computation, HCOMP '10
, pp. 64-67
-
-
Ipeirotis, P.G.1
Provost, F.2
Wang, J.3
-
19
-
-
84869838776
-
Robust detection of comment spam using entropy rate
-
ACM
-
A. Kantchelian, J. Ma, L. Huang, S. Afroz, A. D. Joseph, and J. D. Tygar. Robust detection of comment spam using entropy rate. In Proceedings of the 5th ACM Workshop on Artificial Intelligence and Security, AISEC 2012. ACM, 2012.
-
(2012)
Proceedings of the 5th ACM Workshop on Artificial Intelligence and Security, AISEC 2012
-
-
Kantchelian, A.1
Ma, J.2
Huang, L.3
Afroz, S.4
Joseph, A.D.5
Tygar, J.D.6
-
24
-
-
84869390927
-
Knowing your enemy: Understanding and detecting malicious web advertising
-
Z. Li, K. Zhang, Y. Xie, F. Yu, and X. Wang. Knowing your enemy: Understanding and detecting malicious web advertising. In CCS, 2012.
-
(2012)
CCS
-
-
Li, Z.1
Zhang, K.2
Xie, Y.3
Yu, F.4
Wang, X.5
-
25
-
-
77955660961
-
Mining adversarial patterns via regularized loss minimization
-
July
-
W. Liu and S. Chawla. Mining adversarial patterns via regularized loss minimization. Machine Learning, 81(1):69-83, July 2010.
-
(2010)
Machine Learning
, vol.81
, Issue.1
, pp. 69-83
-
-
Liu, W.1
Chawla, S.2
-
27
-
-
80755169472
-
Surf: Detecting and measuring search poisoning
-
L. Lu, R. Perdisci, and W. Lee. Surf: Detecting and measuring search poisoning. In CCS, 2011.
-
(2011)
CCS
-
-
Lu, L.1
Perdisci, R.2
Lee, W.3
-
30
-
-
85084095941
-
Exploiting machine learning to subvert your spam filter
-
Berkeley, CA, USA, USENIX Association
-
st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), pages 1-9, Berkeley, CA, USA, 2008. USENIX Association.
-
(2008)
st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)
, pp. 1-9
-
-
Nelson, B.1
Barreno, M.2
Chi, F.J.3
Joseph, A.D.4
Rubinstein, B.I.P.5
Saini, U.6
Sutton, C.7
Tygar, J.D.8
Xia, K.9
-
31
-
-
27544498978
-
Polygraph: Automatically generating signatures for polymorphic worms
-
IEEE
-
J. Newsome, B. Karp, and D. Song. Polygraph: Automatically generating signatures for polymorphic worms. In Security and Privacy, 2005 IEEE Symposium on, pages 226-241. IEEE, 2005.
-
(2005)
Security and Privacy, 2005 IEEE Symposium on
, pp. 226-241
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
32
-
-
33750332606
-
Paragraph: Thwarting signature learning by training maliciously
-
Springer
-
J. Newsome, B. Karp, and D. Song. Paragraph: Thwarting signature learning by training maliciously. In Recent Advances in Intrusion Detection, pages 81-105. Springer, 2006.
-
(2006)
Recent Advances in Intrusion Detection
, pp. 81-105
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
33
-
-
1942418620
-
On discriminative vs. generative classifiers: A comparison of logistic regression and naive bayes
-
A. Y. Ng and M. I. Jordan. On discriminative vs. generative classifiers: A comparison of logistic regression and naive bayes. In NIPS, pages 841-848, 2001.
-
(2001)
NIPS
, pp. 841-848
-
-
Ng, A.Y.1
Jordan, M.I.2
-
34
-
-
77952388137
-
Filtering spam with behavioral blacklisting
-
New York, NY, USA, ACM
-
th ACM conference on Computer and communications security (CCS), pages 342-351, New York, NY, USA, 2007. ACM.
-
(2007)
th ACM Conference on Computer and Communications Security (CCS)
, pp. 342-351
-
-
Ramachandran, A.1
Feamster, N.2
Vempala, S.3
-
35
-
-
70450279044
-
Learning and classification of malware behavior
-
K. Rieck, T. Holz, C. Willems, P. Dussel, and P. Laskov. Learning and classification of malware behavior. In DIMVA, 2008.
-
(2008)
DIMVA
-
-
Rieck, K.1
Holz, T.2
Willems, C.3
Dussel, P.4
Laskov, P.5
-
36
-
-
79958743806
-
Automatic analysis of malware behavior using machine learning
-
K. Rieck, P. Trinius, C. Willems, and T. Holz. Automatic analysis of malware behavior using machine learning. Journal of Computer Security, 19(4), 2011.
-
(2011)
Journal of Computer Security
, vol.19
, Issue.4
-
-
Rieck, K.1
Trinius, P.2
Willems, C.3
Holz, T.4
-
38
-
-
75149176174
-
Ensemble-based classifiers
-
Feb.
-
L. Rokach. Ensemble-based classifiers. Artif. Intell. Rev., 33(1-2):1-39, Feb. 2010.
-
(2010)
Artif. Intell. Rev.
, vol.33
, Issue.1-2
, pp. 1-39
-
-
Rokach, L.1
-
39
-
-
84877775237
-
Antidote: Understanding and defending against poisoning of anomaly detectors
-
ACM
-
B. I. Rubinstein, B. Nelson, L. Huang, A. D. Joseph, S.-h. Lau, S. Rao, N. Taft, and J. Tygar. Antidote: understanding and defending against poisoning of anomaly detectors. In Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, pages 1-14. ACM, 2009.
-
(2009)
Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference
, pp. 1-14
-
-
Rubinstein, B.I.1
Nelson, B.2
Huang, L.3
Joseph, A.D.4
Lau, S.-H.5
Rao, S.6
Taft, N.7
Tygar, J.8
-
40
-
-
84888996861
-
Autonomous learning for detection of javascript attacks: Vision or reality?
-
G. Schwenk, A. Bikadorov, T. Krueger, and K. Rieck. Autonomous learning for detection of javascript attacks: Vision or reality? In AISEC, 2012.
-
(2012)
AISEC
-
-
Schwenk, G.1
Bikadorov, A.2
Krueger, T.3
Rieck, K.4
-
41
-
-
80052672008
-
Detecting adversarial advertisements in the wild
-
ACM
-
D. Sculley, M. E. Otey, M. Pohl, B. Spitznagel, J. Hainsworth, and Y. Zhou. Detecting adversarial advertisements in the wild. In Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 274-282. ACM, 2011.
-
(2011)
Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 274-282
-
-
Sculley, D.1
Otey, M.E.2
Pohl, M.3
Spitznagel, B.4
Hainsworth, J.5
Zhou, Y.6
-
45
-
-
77955209381
-
Outside the closed world: On using machine learning for network intrusion detection
-
IEEE
-
R. Sommer and V. Paxson. Outside the closed world: On using machine learning for network intrusion detection. In Security and Privacy (SP), 2010 IEEE Symposium on, pages 305-316. IEEE, 2010.
-
(2010)
Security and Privacy (SP), 2010 IEEE Symposium on
, pp. 305-316
-
-
Sommer, R.1
Paxson, V.2
-
46
-
-
85180414841
-
Detection of malicious pdf files based on hierarchical document structure
-
The Internet Society
-
N. Srndic and P. Laskov. Detection of malicious pdf files based on hierarchical document structure. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA. The Internet Society, 2013.
-
(2013)
Proceedings of the Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA
-
-
Srndic, N.1
Laskov, P.2
-
47
-
-
79959891780
-
Facebook immune system
-
New York, NY, USA, ACM
-
T. Stein, E. Chen, and K. Mangla. Facebook immune system. In Proceedings of the 4th Workshop on Social Network Systems, SNS '11, pages 8:1-8:8, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 4th Workshop on Social Network Systems, SNS '11
-
-
Stein, T.1
Chen, E.2
Mangla, K.3
-
48
-
-
80051985554
-
Design and evaluation of a real-time URL spam filtering service
-
IEEE
-
K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song. Design and evaluation of a real-time URL spam filtering service. In 2011 IEEE Symposium on Security and Privacy (SP), pages 447-462. IEEE, 2011.
-
(2011)
2011 IEEE Symposium on Security and Privacy (SP)
, pp. 447-462
-
-
Thomas, K.1
Grier, C.2
Ma, J.3
Paxson, V.4
Song, D.5
-
52
-
-
80755134983
-
Traffic morphing: An efficient defense against statistical traffic analysis
-
The Internet Society
-
C. V. Wright, S. E. Coull, and F. Monrose. Traffic morphing: An efficient defense against statistical traffic analysis. In NDSS. The Internet Society, 2009.
-
(2009)
NDSS
-
-
Wright, C.V.1
Coull, S.E.2
Monrose, F.3
|