-
1
-
-
77955038057
-
Scalable, behavior-based malware clustering
-
U. Bayer, P. Comparetti, C. Hlauschek, C. Kruegel, and E. Kirda, "Scalable, behavior-based malware clustering," in Network and Distributed System Security Symposium (NDSS), 2009.
-
(2009)
Network and Distributed System Security Symposium (NDSS)
-
-
Bayer, U.1
Comparetti, P.2
Hlauschek, C.3
Kruegel, C.4
Kirda, E.5
-
3
-
-
77954566293
-
Detection and analysis of driveby-download attacks and malicious Java Script code
-
M. Cova, C. Kruegel, and G. Vigna, "Detection and analysis of driveby-download attacks and malicious Java Script code," in International Conference on World Wide Web (WWW), 2010, pp. 281-290.
-
(2010)
International Conference on World Wide Web (WWW)
, pp. 281-290
-
-
Cova, M.1
Kruegel, C.2
Vigna, G.3
-
4
-
-
85180410682
-
CAMP: Content-agnostic malware protection
-
M. A. Rajab, L. Ballard, N. Lutz, P. Mavrommatis, and N. Provos, "CAMP: Content-agnostic malware protection," in Network and Distributed System Security Symposium (NDSS), 2013.
-
(2013)
Network and Distributed System Security Symposium (NDSS)
-
-
Rajab, M.A.1
Ballard, L.2
Lutz, N.3
Mavrommatis, P.4
Provos, N.5
-
5
-
-
84873447654
-
Prophiler: A fast filter for the large-scale detection of malicious web pages
-
D. Canali, M. Cova, G. Vigna, and C. Kruegel, "Prophiler: a fast filter for the large-scale detection of malicious web pages," in International Conference on World Wide Web (WWW), 2011, pp. 197-206.
-
(2011)
International Conference on World Wide Web (WWW)
, pp. 197-206
-
-
Canali, D.1
Cova, M.2
Vigna, G.3
Kruegel, C.4
-
6
-
-
84889042781
-
Shady paths: Leveraging surfing crowds to detect malicious web pages
-
G. Stringhini, C. Kruegel, and G. Vigna, "Shady paths: leveraging surfing crowds to detect malicious web pages," in ACM Conference on Computer and Communications Security (CCS), 2013, pp. 133-144.
-
(2013)
ACM Conference on Computer and Communications Security (CCS)
, pp. 133-144
-
-
Stringhini, G.1
Kruegel, C.2
Vigna, G.3
-
8
-
-
84888989407
-
Using naive bayes to detect spammy names in social networks
-
D. M. Freeman, "Using naive bayes to detect spammy names in social networks," in ACM Workshop on AI and Security (AISec), 2013, pp. 3-12.
-
(2013)
ACM Workshop on AI and Security (AISec)
, pp. 3-12
-
-
Freeman, D.M.1
-
9
-
-
84881154550
-
Peerrush: Mining for unwanted p2p traffic
-
B. Rahbarinia, R. Perdisci, A. Lanzi, and K. Li, "Peerrush: mining for unwanted p2p traffic," in Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), 2013, pp. 62-82.
-
(2013)
Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)
, pp. 62-82
-
-
Rahbarinia, B.1
Perdisci, R.2
Lanzi, A.3
Li, K.4
-
10
-
-
78049530550
-
The security of machine learning
-
M. Barreno, B. Nelson, A. Joseph, and J. Tygar, "The security of machine learning," Machine Learning, vol. 81, no. 2, pp. 121-148, 2010.
-
(2010)
Machine Learning
, vol.81
, Issue.2
, pp. 121-148
-
-
Barreno, M.1
Nelson, B.2
Joseph, A.3
Tygar, J.4
-
11
-
-
0027640858
-
Learning in the presence of malicious errors
-
M. Kearns and M. Li, "Learning in the presence of malicious errors," SIAM Journal on Computing, vol. 22, no. 4, pp. 807-837, 1993.
-
(1993)
SIAM Journal on Computing
, vol.22
, Issue.4
, pp. 807-837
-
-
Kearns, M.1
Li, M.2
-
12
-
-
84869200775
-
Static prediction games for adversarial learning problems
-
M. Brückner, C. Kanzow, and T. Scheffer, "Static prediction games for adversarial learning problems," Journal of Machine Learning Research, pp. 2617-2654, 2012.
-
(2012)
Journal of Machine Learning Research
, pp. 2617-2654
-
-
Brückner, M.1
Kanzow, C.2
Scheffer, T.3
-
13
-
-
84873445143
-
Security analysis of online centroid anomaly detection
-
M. Kloft and P. Laskov, "Security analysis of online centroid anomaly detection," Journal of Machine Learning Research, vol. 13, pp. 3133-3176, 2012.
-
(2012)
Journal of Machine Learning Research
, vol.13
, pp. 3133-3176
-
-
Kloft, M.1
Laskov, P.2
-
14
-
-
84886467730
-
Security evaluation of pattern classifiers under attack
-
PrePrints
-
B. Biggio, G. Fumera, and F. Roli, "Security evaluation of pattern classifiers under attack," IEEE Transactions on Knowledge and Data Engineering, vol. 99, no. PrePrints, p. 1, 2013.
-
(2013)
IEEE Transactions on Knowledge and Data Engineering
, vol.99
, pp. 1
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
15
-
-
85077703150
-
Polymorphic blending attacks
-
P. Fogla, M. Sharif, R. Perdisci, O. Kolesnikov, and W. Lee, "Polymorphic blending attacks," in USENIX Security Symposium, 2006, pp. 241-256.
-
(2006)
USENIX Security Symposium
, pp. 241-256
-
-
Fogla, P.1
Sharif, M.2
Perdisci, R.3
Kolesnikov, O.4
Lee, W.5
-
16
-
-
33751051489
-
Misleading worm signature generators using deliberate noise injection
-
R. Perdisci, D. Dagon, W. Lee, P. Fogla, and M. Sharif, "Misleading worm signature generators using deliberate noise injection," in IEEE Symposium on Security and Privacy, 2006, pp. 17-31.
-
(2006)
IEEE Symposium on Security and Privacy
, pp. 17-31
-
-
Perdisci, R.1
Dagon, D.2
Lee, W.3
Fogla, P.4
Sharif, M.5
-
20
-
-
34547359214
-
Evading network anomaly detection systems: Formal reasoning and practical techniques
-
P. Fogla and W. Lee, "Evading network anomaly detection systems: formal reasoning and practical techniques," in ACM Conference on Computer and Communications Security, 2006, pp. 59-68.
-
(2006)
ACM Conference on Computer and Communications Security
, pp. 59-68
-
-
Fogla, P.1
Lee, W.2
-
22
-
-
84886493283
-
Evasion attacks against machine learning at test time
-
[Online]
-
B. Biggio, I. Corona, D. Maiorca, B. Nelson, N. Šrndić, P. Laskov, G. Giacinto, and F. Roli, "Evasion attacks against machine learning at test time," in European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases, 2013. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-40994-3 25
-
(2013)
European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases
-
-
Biggio, B.1
Corona, I.2
Maiorca, D.3
Nelson, B.4
Šrndić, N.5
Laskov, P.6
Giacinto, G.7
Roli, F.8
-
24
-
-
84914168205
-
-
Department of Computer Science, George Mason University, 4400 University Drive MSN 4A5, Fairfax, VA 22030-4444 USA, Tech. Rep. GMU-CS-TR-2012-5
-
-, "Malicious PDF detection using metadata and structural features," Available at http://cs.gmu.edu, Department of Computer Science, George Mason University, 4400 University Drive MSN 4A5, Fairfax, VA 22030-4444 USA, Tech. Rep. GMU-CS-TR-2012-5, 2012.
-
(2012)
Malicious PDF Detection Using Metadata and Structural Features
-
-
Smutz, C.1
Stavrou, A.2
-
25
-
-
80052672008
-
Detecting adversarial advertisements in the wild
-
D. Sculley, M. E. Otey, M. Pohl, B. Spitznagel, J. Hainsworth, and Y. Zhou, "Detecting adversarial advertisements in the wild," in ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), 2011, pp. 274-282.
-
(2011)
ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)
, pp. 274-282
-
-
Sculley, D.1
Otey, M.E.2
Pohl, M.3
Spitznagel, B.4
Hainsworth, J.5
Zhou, Y.6
-
26
-
-
85084095941
-
Exploiting machine learning to subvert your spam filter
-
B. Nelson, M. Barreno, F. J. Chi, A. D. Joseph, B. I. P. Rubinstein, U. Saini, C. Sutton, J. D. Tygar, and K. Xia, "Exploiting machine learning to subvert your spam filter," in USENIX Workshop on Largescale Exploits and Emergent Threats (LEET), 2008, pp. 1-9.
-
(2008)
USENIX Workshop on Largescale Exploits and Emergent Threats (LEET)
, pp. 1-9
-
-
Nelson, B.1
Barreno, M.2
Chi, F.J.3
Joseph, A.D.4
Rubinstein, B.I.P.5
Saini, U.6
Sutton, C.7
Tygar, J.D.8
Xia, K.9
-
27
-
-
84863160317
-
Die free or live hard? Empirical evaluation and new design for fighting evolving twitter spammers
-
C. Yang, R. C. Harkreader, and G. Gu, "Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers," in Recent Adances in Intrusion Detection (RAID), 2011, pp. 318-337.
-
(2011)
Recent Adances in Intrusion Detection (RAID)
, pp. 318-337
-
-
Yang, C.1
Harkreader, R.C.2
Gu, G.3
-
28
-
-
84872026771
-
Adversarial stylometry: Circumventing authorship recognition to preserve privacy and anonymity
-
M. Brennan, S. Afroz, and R. Greenstadt, "Adversarial stylometry: Circumventing authorship recognition to preserve privacy and anonymity," ACM Transactions on Information Systems Security, vol. 15, no. 3, pp. 1-22, 2012.
-
(2012)
ACM Transactions on Information Systems Security
, vol.15
, Issue.3
, pp. 1-22
-
-
Brennan, M.1
Afroz, S.2
Greenstadt, R.3
-
29
-
-
80053156982
-
Outlierbased approaches for intrinsic and external plagiarism detection
-
G. Oberreuter, G. L'Huillier, S. A. Ríos, and J. D. Velásquez, "Outlierbased approaches for intrinsic and external plagiarism detection," in Knowledge-based and intelligent information and engineering systems, 2011, pp. 11-20.
-
(2011)
Knowledge-based and Intelligent Information and Engineering Systems
, pp. 11-20
-
-
Oberreuter, G.1
L'Huillier, G.2
Ríos, S.A.3
Velásquez, J.D.4
-
31
-
-
0035478854
-
Random forests
-
L. Breiman, "Random forests," Machine learning, vol. 45, no. 1, pp. 5-32, 2001.
-
(2001)
Machine Learning
, vol.45
, Issue.1
, pp. 5-32
-
-
Breiman, L.1
-
32
-
-
84876950829
-
Abusing file processing in malware detectors for fun and profit
-
S. Jana and V. Shmatikov, "Abusing file processing in malware detectors for fun and profit," in IEEE Symposium on Security and Privacy, 2012, pp. 80-94.
-
(2012)
IEEE Symposium on Security and Privacy
, pp. 80-94
-
-
Jana, S.1
Shmatikov, V.2
-
33
-
-
84877998967
-
Looking at the bag is not enough to find the bomb: An evasion of structural methods for malicious pdf files detection
-
D. Maiorca, I. Corona, and G. Giacinto, "Looking at the bag is not enough to find the bomb: An evasion of structural methods for malicious pdf files detection," in SIGSAC Symposium on Information, Computer and Communications Security, 2013, pp. 119-130.
-
(2013)
SIGSAC Symposium on Information, Computer and Communications Security
, pp. 119-130
-
-
Maiorca, D.1
Corona, I.2
Giacinto, G.3
-
34
-
-
0001473437
-
On estimation of a probability density function and mode
-
E. Parzen, "On estimation of a probability density function and mode," The Annals of Mathematical Statistics, vol. 33, no. 3, pp. 1065-1076, 1962.
-
(1962)
The Annals of Mathematical Statistics
, vol.33
, Issue.3
, pp. 1065-1076
-
-
Parzen, E.1
-
35
-
-
34249753618
-
Support vector networks
-
C. Cortes and V. Vapnik, "Support vector networks," Machine Learning, vol. 20, pp. 273-297, 1995.
-
(1995)
Machine Learning
, vol.20
, pp. 273-297
-
-
Cortes, C.1
Vapnik, V.2
-
36
-
-
80555140075
-
Scikit-learn: Machine learning in Python
-
F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay, "Scikit-learn: Machine learning in Python," Journal of Machine Learning Research, vol. 12, pp. 2825-2830, 2011.
-
(2011)
Journal of Machine Learning Research
, vol.12
, pp. 2825-2830
-
-
Pedregosa, F.1
Varoquaux, G.2
Gramfort, A.3
Michel, V.4
Thirion, B.5
Grisel, O.6
Blondel, M.7
Prettenhofer, P.8
Weiss, R.9
Dubourg, V.10
Vanderplas, J.11
Passos, A.12
Cournapeau, D.13
Brucher, M.14
Perrot, M.15
Duchesnay, E.16
-
37
-
-
33750335757
-
Anagram: A content anomaly detector resistant to mimicry attack
-
K. Wang, J. Parekh, and S. Stolfo, "Anagram: A content anomaly detector resistant to mimicry attack," in Recent Adances in Intrusion Detection (RAID), 2006, pp. 226-248.
-
(2006)
Recent Adances in Intrusion Detection (RAID)
, pp. 226-248
-
-
Wang, K.1
Parekh, J.2
Stolfo, S.3
-
38
-
-
33846910249
-
Language models for detection of unknown attacks in network traffic
-
K. Rieck and P. Laskov, "Language models for detection of unknown attacks in network traffic," Journal in Computer Virology, vol. 2, pp. 243-256, 2007.
-
(2007)
Journal in Computer Virology
, vol.2
, pp. 243-256
-
-
Rieck, K.1
Laskov, P.2
-
39
-
-
33845768389
-
Learning to detect and classify malicious executables in the wild
-
to appear
-
J. Kolter and M. Maloof, "Learning to detect and classify malicious executables in the wild," Journal of Machine Learning Research, 2006, to appear.
-
(2006)
Journal of Machine Learning Research
-
-
Kolter, J.1
Maloof, M.2
-
40
-
-
49949094798
-
Embedded malware detection using markov n-grams
-
Z. Shafiq, S. Khayam, and M. Farooq, "Embedded malware detection using markov n-grams," in Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), 2008, pp. 88-107.
-
(2008)
Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)
, pp. 88-107
-
-
Shafiq, Z.1
Khayam, S.2
Farooq, M.3
-
41
-
-
78751553658
-
Cujo: Efficient detection and prevention of drive-by-download attacks
-
K. Rieck, T. Krüger, and A. Dewald, "Cujo: Efficient detection and prevention of drive-by-download attacks," in Annual Computer Security Applications Conference (ACSAC), 2010, pp. 31-39.
-
(2010)
Annual Computer Security Applications Conference (ACSAC)
, pp. 31-39
-
-
Rieck, K.1
Krüger, T.2
Dewald, A.3
-
44
-
-
78049529865
-
Learning to classify with missing and corrupted features
-
O. Dekel, O. Shamir, and L. Xiao, "Learning to classify with missing and corrupted features," Machine Learning, vol. 81, no. 2, pp. 149-178, 2010.
-
(2010)
Machine Learning
, vol.81
, Issue.2
, pp. 149-178
-
-
Dekel, O.1
Shamir, O.2
Xiao, L.3
-
45
-
-
84956994921
-
Methods for designing multiple classifier systems
-
F. Roli, G. Giacinto, and G. Vernazza, "Methods for designing multiple classifier systems," in Multiple Classifier Systems, 2001, pp. 78-87.
-
(2001)
Multiple Classifier Systems
, pp. 78-87
-
-
Roli, F.1
Giacinto, G.2
Vernazza, G.3
-
46
-
-
61749083929
-
McPAD: A multiple classifier system for accurate payload-based anomaly detection
-
R. Perdisci, D. Ariu, P. Fogla, G. Giacinto, and W. Lee, "McPAD: A multiple classifier system for accurate payload-based anomaly detection," Computer Networks, vol. 53, no. 6, pp. 864-881, 2009.
-
(2009)
Computer Networks
, vol.53
, Issue.6
, pp. 864-881
-
-
Perdisci, R.1
Ariu, D.2
Fogla, P.3
Giacinto, G.4
Lee, W.5
-
47
-
-
70349319703
-
Multiple classifier systems for adversarial classification tasks
-
B. Biggio, G. Fumera, and F. Roli, "Multiple classifier systems for adversarial classification tasks." in Multiple Classifier Systems, 2009, pp. 132-141.
-
(2009)
Multiple Classifier Systems
, pp. 132-141
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
|