-
2
-
-
0003104018
-
On the merits of building categorization systems by supervised clustering
-
ACM, New York, NY
-
Aggarwal, C.C., Gates, S.C., Yu, P.S.: On the merits of building categorization systems by supervised clustering. In: KDD, KDD’99, pp. 352–356. ACM, New York, NY (1999)
-
(1999)
KDD, KDD’99
, pp. 352-356
-
-
Aggarwal, C.C.1
Gates, S.C.2
Yu, P.S.3
-
3
-
-
67650075157
-
Investigating two different approaches for encrypted traffic classification
-
IEEE Computer Society, Washington, DC
-
Alshammari, R.A., Zincir-Heywood, A.N.: Investigating two different approaches for encrypted traffic classification. In: Proceedings of the Sixth Annual Conference on Privacy, Security and Trust (PST’08), pp. 156–166. IEEE Computer Society, Washington, DC (2008)
-
(2008)
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust (PST’08)
, pp. 156-166
-
-
Alshammari, R.A.1
Zincir-Heywood, A.N.2
-
6
-
-
38149089416
-
-
Tech. rep.: University of Michigan
-
Bailey, M., Oberheide, J., Andersen, J., Mao, Z.M., Jahanian, F., Nazario, J.: Automated classification and analysis of Internet malware. Tech. rep., University of Michigan (2007). http://www.eecs.umich.edu/techreports/cse/2007/CSE-TR-530-07.pdf
-
(2007)
Automated classification and analysis of Internet malware
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.M.4
Jahanian, F.5
Nazario, J.6
-
7
-
-
85043201839
-
Scalable, behavior-based malware clustering
-
Bayer, U., Comparetti, P.M., Hlauschek, C., Kruegel, C., Kirda, E.: Scalable, behavior-based malware clustering. In: NDSS, vol. 9 (2009)
-
(2009)
NDSS, vol
, pp. 9
-
-
Bayer, U.1
Comparetti, P.M.2
Hlauschek, C.3
Kruegel, C.4
Kirda, E.5
-
8
-
-
85080378133
-
An algorithm for anomaly-based botnet detection
-
USENIX Association, Berkeley, CA
-
Binkley, J.R., Singh, S.: An algorithm for anomaly-based botnet detection. In: Proceedings of the 2nd conference on Steps to Reducing Unwanted Traffic on the Internet, no. 2 in SRUTI, pp. 1–7. USENIX Association, Berkeley, CA (2006)
-
(2006)
Proceedings of the 2nd conference on Steps to Reducing Unwanted Traffic on the Internet, no. 2 in SRUTI
, pp. 1-7
-
-
Binkley, J.R.1
Singh, S.2
-
9
-
-
0345389037
-
-
Tech. rep.: The MITRE Corporation
-
Bloedorn, E., Christiansen, A.D., Hill, W., Skorupka, C., Talbot, L.M., Tivel, J.: Data mining for network intrusion detection: How to get started. Tech. rep., The MITRE Corporation (2001). http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.102.8556&rep=rep1&type=pdf
-
(2001)
Data mining for network intrusion detection: How to get started
-
-
Bloedorn, E.1
Christiansen, A.D.2
Hill, W.3
Skorupka, C.4
Talbot, L.M.5
Tivel, J.6
-
10
-
-
84857332705
-
Cross-domain collaborative anomaly detection: so far yet so close
-
Springer, Berlin
-
Boggs, N., Hiremagalore, S., Stavrou, A., Stolfo, S.J.: Cross-domain collaborative anomaly detection: so far yet so close. In: Recent Advances in Intrusion Detection, pp. 142–160. Springer, Berlin (2011)
-
(2011)
Recent Advances in Intrusion Detection
, pp. 142-160
-
-
Boggs, N.1
Hiremagalore, S.2
Stavrou, A.3
Stolfo, S.J.4
-
11
-
-
84896947585
-
Towards fingerprinting malicious traffic
-
Elsevier, Amsterdam
-
Boukhtouta, A., Lakhdari, N.E., Mokhov, S.A., Debbabi, M.: Towards fingerprinting malicious traffic. In: Proceedings of ANT’13, vol. 19, pp. 548–555. Elsevier, Amsterdam (2013). doi:10.1016/j.procs.2013.06.073
-
(2013)
Proceedings of ANT’13, vol. 19
, pp. 548-555
-
-
Boukhtouta, A.1
Lakhdari, N.E.2
Mokhov, S.A.3
Debbabi, M.4
-
12
-
-
77956214438
-
Beyond heuristics: Learning to classify vulnerabilities and predict exploits
-
ACM, New York, NY
-
Bozorgi, M., Saul, L.K., Savage, S., Voelker, G.M.: Beyond heuristics: Learning to classify vulnerabilities and predict exploits. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD’10, pp. 105–114. ACM, New York, NY (2010). doi:10.1145/1835804.1835821
-
(2010)
Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD’10
, pp. 105-114
-
-
Bozorgi, M.1
Saul, L.K.2
Savage, S.3
Voelker, G.M.4
-
13
-
-
74049105157
-
P2P botnet detection using behavior clustering & statistical tests
-
ACM, New York, NY
-
Chang, S., Daniels, T.E.: P2P botnet detection using behavior clustering & statistical tests. In: Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence. AISec, pp. 23–30. ACM, New York, NY (2009)
-
(2009)
Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence. AISec
, pp. 23-30
-
-
Chang, S.1
Daniels, T.E.2
-
15
-
-
2942723846
-
A divisive information theoretic feature clustering algorithm for text classification
-
Dhillon, I.S., Mallela, S., Kumar, R.: A divisive information theoretic feature clustering algorithm for text classification. J. Mach. Learn. Res. 3, 1265–1287 (2003)
-
(2003)
J. Mach. Learn. Res.
, vol.3
, pp. 1265-1287
-
-
Dhillon, I.S.1
Mallela, S.2
Kumar, R.3
-
16
-
-
84875230538
-
CoCoSpot: clustering and recognizing botnet command and control channels using traffic analysis
-
Dietrich, C.J., Rossow, C., Pohlmann, N.: CoCoSpot: clustering and recognizing botnet command and control channels using traffic analysis. Comput. Netw. 57(2), 475–486 (2013)
-
(2013)
Comput. Netw.
, vol.57
, Issue.2
, pp. 475-486
-
-
Dietrich, C.J.1
Rossow, C.2
Pohlmann, N.3
-
17
-
-
0003922190
-
-
Wiley, New York
-
Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification. Wiley, New York (2012)
-
(2012)
Pattern Classification
-
-
Duda, R.O.1
Hart, P.E.2
Stork, D.G.3
-
18
-
-
0142095474
-
Using artificial anomalies to detect unknown and known network intrusions
-
Fan, W., Miller, M., Stolfo, S., Lee, W., Chan, P.: Using artificial anomalies to detect unknown and known network intrusions. In: Proceedings of the IEEE International Conference on Data Mining (ICDM 2001), pp. 123–130 (2001). doi:10.1109/ICDM.2001.989509
-
(2001)
Proceedings of the IEEE International Conference on Data Mining (ICDM 2001)
, pp. 123-130
-
-
Fan, W.1
Miller, M.2
Stolfo, S.3
Lee, W.4
Chan, P.5
-
19
-
-
84964218087
-
-
Frank, E.: J48. [online] (2012)
-
Frank, E.: J48. [online] (2012). http://weka.sourceforge.net/doc.dev/weka/classifiers/trees/J48.html
-
-
-
-
20
-
-
84964218088
-
Class SMO
-
Frank, E., Legg, S., Inglis, S.: Class SMO. [online] (2012). http://weka.sourceforge.net/doc/weka/classifiers/functions/SMO.html
-
(2012)
[online]
-
-
Frank, E.1
Legg, S.2
Inglis, S.3
-
21
-
-
58149321460
-
Boosting a weak learning algorithm by majority
-
Freund, Y.: Boosting a weak learning algorithm by majority. Inf. Comput. 121(2), 256–285 (1995)
-
(1995)
Inf. Comput.
, vol.121
, Issue.2
, pp. 256-285
-
-
Freund, Y.1
-
22
-
-
74049104498
-
Neural network and artificial immune systems for malware and network intrusion detection
-
Springer, Berlin
-
Golovko, V., Bezobrazov, S., Kachurka, P., Vaitsekhovich, L.: Neural network and artificial immune systems for malware and network intrusion detection. In: Advances in Machine Learning II, pp. 485–513. Springer, Berlin (2010)
-
(2010)
Advances in Machine Learning II
, pp. 485-513
-
-
Golovko, V.1
Bezobrazov, S.2
Kachurka, P.3
Vaitsekhovich, L.4
-
23
-
-
85061529860
-
BotHunter: detecting malware infection through IDS-driven dialog correlation
-
USENIX Association, Berkeley, CA
-
Gu, G., Porras, P., Yegneswaran, V., Fong, M., Lee, W.: BotHunter: detecting malware infection through IDS-driven dialog correlation. In: Proceedings of 16th USENIX Security Symposium, SS, pp. 1–16. USENIX Association, Berkeley, CA (2007)
-
(2007)
Proceedings of 16th USENIX Security Symposium, SS
, pp. 1-16
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
24
-
-
85175133385
-
BotSniffer: Detecting botnet command and control channels in network traffic
-
Gu, G., Zhang, J., Lee, W.: BotSniffer: Detecting botnet command and control channels in network traffic. In: Proceedings of the Network and Distributed System Security Symposium, NDSS. The Internet Society (2008)
-
(2008)
Proceedings of the Network and Distributed System Security Symposium, NDSS. The Internet Society
-
-
Gu, G.1
Zhang, J.2
Lee, W.3
-
25
-
-
85075837457
-
BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection
-
USENIX Association, Berkeley, CA
-
Gu, G., Perdisci, R., Zhang, J., Lee, W.: BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection. In: Proceedings of the 17th Security Symposium, SS, pp. 139–154. USENIX Association, Berkeley, CA (2008)
-
(2008)
Proceedings of the 17th Security Symposium, SS
, pp. 139-154
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
28
-
-
0003074296
-
Support vector machines
-
Hearst, M.A., Dumais, S., Osman, E., Platt, J., Scholkopf, B.: Support vector machines. IEEE of Intelligent Systems and Their Applications 13(4), 18–28 (1998)
-
(1998)
IEEE of Intelligent Systems and Their Applications
, vol.13
, Issue.4
, pp. 18-28
-
-
Hearst, M.A.1
Dumais, S.2
Osman, E.3
Platt, J.4
Scholkopf, B.5
-
29
-
-
85077210471
-
MutantX-S: Scalable malware clustering based on static features
-
Hu, X., Shin, K.G., Bhatkar, S., Griffin, K.: MutantX-S: Scalable malware clustering based on static features. In: USENIX Annual Technical Conference, pp. 187–198 (2013)
-
(2013)
USENIX Annual Technical Conference
, pp. 187-198
-
-
Hu, X.1
Shin, K.G.2
Bhatkar, S.3
Griffin, K.4
-
31
-
-
85093872656
-
Wide-scale botnet detection and characterization
-
USENIX Association, Berkeley, CA
-
Karasaridis, A., Rexroad, B., Hoeflin, D.: Wide-scale botnet detection and characterization. In: Proceedings of the First Workshop on Hot Topics in Understanding Botnets, HotBots, pp. 1–7. USENIX Association, Berkeley, CA (2007)
-
(2007)
Proceedings of the First Workshop on Hot Topics in Understanding Botnets, HotBots
, pp. 1-7
-
-
Karasaridis, A.1
Rexroad, B.2
Hoeflin, D.3
-
32
-
-
84964207459
-
-
Karypis Lab: Data clustering software. [online] (2006–2014)
-
Karypis Lab: Data clustering software. [online] (2006–2014). http://glaros.dtc.umn.edu/gkhome/views/cluto
-
-
-
-
33
-
-
84874104724
-
ConfDTree: Improving decision trees using confidence intervals
-
Katz, G., Shabtai, A., Rokach, L., Ofek, N.: ConfDTree: Improving decision trees using confidence intervals. In: 12th IEEE International Conference on, Data Mining (ICDM), pp. 339–348 (2012)
-
(2012)
12th IEEE International Conference on, Data Mining (ICDM)
, pp. 339-348
-
-
Katz, G.1
Shabtai, A.2
Rokach, L.3
Ofek, N.4
-
34
-
-
84942645359
-
Automated classification of C&C connections through malware URL clustering
-
Springer, Berlin
-
Kheir, N., Blanc, G., Debar, H., Garcia-Alfaro, J., Yang, D.: Automated classification of C&C connections through malware URL clustering. In: ICT Systems Security and Privacy Protection, pp. 252–266. Springer, Berlin (2015)
-
(2015)
ICT Systems Security and Privacy Protection
, pp. 252-266
-
-
Kheir, N.1
Blanc, G.2
Debar, H.3
Garcia-Alfaro, J.4
Yang, D.5
-
35
-
-
84893337595
-
SigMal: a static signal processing based malware triage
-
ACM, New York, NY
-
Kirat, D., Nataraj, L., Vigna, G., Manjunath, B.S.: SigMal: a static signal processing based malware triage. In: ACSAC’13. ACM, New York, NY (2013). doi:10.1145/2523649.2523682
-
(2013)
ACSAC’13
-
-
Kirat, D.1
Nataraj, L.2
Vigna, G.3
Manjunath, B.S.4
-
36
-
-
29144524861
-
Texture image retrieval using new rotated complex wavelet filters
-
Kokare, M., Biswas, P.K., Chatterji, B.N.: Texture image retrieval using new rotated complex wavelet filters. IEEE Transaction on Systems, Man, and Cybernetics-Part B: Cybernetics 6(35), 1168–1178 (2005)
-
(2005)
IEEE Transaction on Systems, Man, and Cybernetics-Part B: Cybernetics
, vol.6
, Issue.35
, pp. 1168-1178
-
-
Kokare, M.1
Biswas, P.K.2
Chatterji, B.N.3
-
37
-
-
33947180114
-
Rotation-invariant texture image retrieval using rotated complex wavelet filters
-
Kokare, M., Biswas, P.K., Chatterji, B.N.: Rotation-invariant texture image retrieval using rotated complex wavelet filters. IEEE Transaction on Systems, Man, and Cybernetics-Part B: Cybernetics 6(36), 1273–1282 (2006)
-
(2006)
IEEE Transaction on Systems, Man, and Cybernetics-Part B: Cybernetics
, vol.6
, Issue.36
, pp. 1273-1282
-
-
Kokare, M.1
Biswas, P.K.2
Chatterji, B.N.3
-
38
-
-
20344380853
-
Z-ranking: Using statistical analysis to counter the impact of static analysis approximations
-
Kremenek, T., Engler, D.: Z-ranking: Using statistical analysis to counter the impact of static analysis approximations. In: SAS 2003 (2003)
-
(2003)
SAS
, pp. 2003
-
-
Kremenek, T.1
Engler, D.2
-
39
-
-
20344404753
-
-
Kremenek, T., Ashcraft, K., Yang, J., Engler, D.: Correlation exploitation in error ranking. In: Foundations of Software Engineering (FSE) (2004)
-
Kremenek, T., Ashcraft, K., Yang, J., Engler, D.: Correlation exploitation in error ranking. In: Foundations of Software Engineering (FSE) (2004)
-
-
-
-
40
-
-
77949371828
-
From uncertainty to belief: inferring the specification within
-
Kremenek, T., Twohey, P., Back, G., Ng, A., Engler, D.: From uncertainty to belief: inferring the specification within. In: Proceedings of the 7th Symposium on Operating System Design and Implementation (2006)
-
(2006)
Proceedings of the 7th Symposium on Operating System Design and Implementation
-
-
Kremenek, T.1
Twohey, P.2
Back, G.3
Ng, A.4
Engler, D.5
-
41
-
-
0002862737
-
Fast and effective text mining using linear-time document clustering
-
ACM, New York, NY
-
Larsen, B., Aone, C.: Fast and effective text mining using linear-time document clustering. In: KDD, KDD’99, pp. 16–22. ACM, New York, NY (1999)
-
(1999)
KDD, KDD’99
, pp. 16-22
-
-
Larsen, B.1
Aone, C.2
-
42
-
-
26844574201
-
Applying data mining to intrusion detection: the quest for automation, efficiency, and credibility
-
Lee, W.: Applying data mining to intrusion detection: the quest for automation, efficiency, and credibility. ACM SIGKDD Explorations Newsletter 4(2), 35–42 (2001)
-
(2001)
ACM SIGKDD Explorations Newsletter
, vol.4
, Issue.2
, pp. 35-42
-
-
Lee, W.1
-
43
-
-
0034455983
-
Adaptive intrusion detection: a data mining approach
-
Lee, W., Stolfo, S.J., Mok, K.W.: Adaptive intrusion detection: a data mining approach. Artificial Intelligence Review 14, 533–567 (2000). doi:10.1023/1006624031083
-
(2000)
Artificial Intelligence Review
, vol.14
, pp. 533-567
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
44
-
-
77949594009
-
Network application identification based on wavelet transform and k-means algorithm
-
Li, R., Xi, O.J., Pang, B., Shen, J., Ren, C.L.: Network application identification based on wavelet transform and k-means algorithm. In: Proceedings of the IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS2009), vol. 1, pp. 38–41 (2009). doi:10.1109/ICICISYS.2009.5357939
-
(2009)
Proceedings of the IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS2009), vol. 1
, pp. 38-41
-
-
Li, R.1
Xi, O.J.2
Pang, B.3
Shen, J.4
Ren, C.L.5
-
45
-
-
61749100211
-
Efficient application identification and the temporal and spatial stability of classification schema
-
Li, W., Canini, M., Moore, A.W., Bolla, R.: Efficient application identification and the temporal and spatial stability of classification schema. Comput. Netw. 53, 790–809 (2009)
-
(2009)
Comput. Netw.
, vol.53
, pp. 790-809
-
-
Li, W.1
Canini, M.2
Moore, A.W.3
Bolla, R.4
-
46
-
-
62949245784
-
Wavelet-based unwanted traffic time series analysis
-
IEEE Computer Society, Washington, DC
-
Limthong, K., Kensuke, F., Watanapongse, P.: Wavelet-based unwanted traffic time series analysis. In: 2008 International Conference on Computer and Electrical Engineering, pp. 445–449. IEEE Computer Society, Washington, DC (2008). doi:10.1109/ICCEE.2008.106
-
(2008)
2008 International Conference on Computer and Electrical Engineering
, pp. 445-449
-
-
Limthong, K.1
Kensuke, F.2
Watanapongse, P.3
-
47
-
-
46149123241
-
Using machine learning techniques to identify botnet traffic
-
IEEE Computer Society, Washington, DC
-
Livadas, C., Walsh, R., Lapsley, D.E., Strayer, W.T.: Using machine learning techniques to identify botnet traffic. In: LCN, pp. 967–974. IEEE Computer Society, Washington, DC (2006)
-
(2006)
LCN
, pp. 967-974
-
-
Livadas, C.1
Walsh, R.2
Lapsley, D.E.3
Strayer, W.T.4
-
48
-
-
31844451490
-
Collaborative distributed intrusion detection. Tech. Rep
-
Locasto, M.E., Parekh, J.J., Stolfo, S., Misra, V.: Collaborative distributed intrusion detection. Tech. Rep. CUCS-012-04 (2004). http://hdl.handle.net/10022/AC:P:29215
-
(2004)
CUCS-012-04
-
-
Locasto, M.E.1
Parekh, J.J.2
Stolfo, S.3
Misra, V.4
-
49
-
-
33745469273
-
Towards collaborative security and P2P intrusion detection
-
Locasto, M.E., Parekh, J.J., Keromytis, A.D., Stolfo, S.J.: Towards collaborative security and P2P intrusion detection. In: Proceedings of the Information Assurance Workshop (IAW’05), from the Sixth Annual IEEE SMC, pp. 333–339. IEEE (2005)
-
(2005)
Proceedings of the Information Assurance Workshop (IAW’05), from the Sixth Annual IEEE SMC, pp. 333–339. IEEE
-
-
Locasto, M.E.1
Parekh, J.J.2
Keromytis, A.D.3
Stolfo, S.J.4
-
51
-
-
84964218514
-
-
MathWorks: MATLAB. [online] (2000–2012)
-
MathWorks: MATLAB. [online] (2000–2012). http://www.mathworks.com/products/matlab/
-
-
-
-
52
-
-
84964218174
-
-
MathWorks: MATLAB Coder. [online] (2012). , last viewed June 2012
-
MathWorks: MATLAB Coder. [online] (2012). http://www.mathworks.com/help/toolbox/coder/coder_product_page.html, last viewed June 2012
-
-
-
-
53
-
-
84964218167
-
-
MathWorks: MATLAB Coder: codegen—generate C/C++ code from MATLAB code. [online] (2012). , last viewed June 2012
-
MathWorks: MATLAB Coder: codegen—generate C/C++ code from MATLAB code. [online] (2012). http://www.mathworks.com/help/toolbox/coder/ref/codegen.html, last viewed June 2012
-
-
-
-
55
-
-
57049169279
-
Study of best algorithm combinations for speech processing tasks in machine learning using median vs. mean clusters in MARF
-
Desai BC, (ed), ACM, Montreal, Quebec
-
Mokhov, S.A.: Study of best algorithm combinations for speech processing tasks in machine learning using median vs. mean clusters in MARF. In: Desai, B.C. (ed.) Proceedings of C3S2E’08, pp. 29–43. ACM, Montreal, Quebec (2008). doi:10.1145/1370256.1370262
-
(2008)
Proceedings of C3S2E’08
, pp. 29-43
-
-
Mokhov, S.A.1
-
56
-
-
84964260414
-
-
Mokhov, S.A.: MARFCAT—MARF-based Code Analysis Tool. Published electronically within the MARF project. (2010–2015). Last viewed February 2014
-
Mokhov, S.A.: MARFCAT—MARF-based Code Analysis Tool. Published electronically within the MARF project. http://sourceforge.net/projects/marf/files/Applications/MARFCAT/ (2010–2015). Last viewed February 2014
-
-
-
-
57
-
-
84964260416
-
-
Mokhov, S.A.: The use of machine learning with signal- and NLP processing of source code to fingerprint, detect, and classify vulnerabilities and weaknesses with MARFCAT. Tech. Rep. NIST SP 500–283, NIST (2011). Report: , online e-print at
-
Mokhov, S.A.: The use of machine learning with signal- and NLP processing of source code to fingerprint, detect, and classify vulnerabilities and weaknesses with MARFCAT. Tech. Rep. NIST SP 500–283, NIST (2011). Report: http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909407, online e-print at http://arxiv.org/abs/1010.2511
-
-
-
-
58
-
-
84964227319
-
Intensional cyberforensics. Ph.D. thesis, Department of Computer Science and Software Engineering, Concordia University
-
Mokhov, S.A.: Intensional cyberforensics. Ph.D. thesis, Department of Computer Science and Software Engineering, Concordia University, Montreal (2013). arXiv:1312.0466
-
Montreal (2013). arXiv
, pp. 0466
-
-
Mokhov, S.A.1
-
59
-
-
84964241787
-
File type analysis using signal processing techniques and machine learning vs. file unix utility for forensic analysis
-
Mokhov, S.A., Debbabi, M.: File type analysis using signal processing techniques and machine learning vs. file unix utility for forensic analysis. In: O. Goebel, S. Frings, D. Guenther, J. Nedon, D. Schadt (eds.) Proceedings of the IT Incident Management and IT Forensics (IMF’08), LNI140, pp. 73–85. GI (2008)
-
(2008)
O. Goebel, S. Frings, D. Guenther, J. Nedon, D. Schadt (eds.) Proceedings of the IT Incident Management and IT Forensics (IMF’08), LNI140, pp. 73–85. GI
-
-
Mokhov, S.A.1
Debbabi, M.2
-
60
-
-
78249242595
-
Formally specifying operational semantics and language constructs of Forensic Lucid
-
GI, Online at
-
Mokhov, S.A., Paquet, J., Debbabi, M.: Formally specifying operational semantics and language constructs of Forensic Lucid. In: O. Göbel, S. Frings, D. Günther, J. Nedon, D. Schadt (eds.) Proceedings of the IT Incident Management and IT Forensics (IMF’08), LNI, vol. 140, pp. 197–216. GI (2008). Online at http://subs.emis.de/LNI/Proceedings/Proceedings140/gi-proc-140-014.pdf
-
(2008)
Proceedings of the IT Incident Management and IT Forensics (IMF’08), LNI, vol. 140
, pp. 197-216
-
-
Mokhov, S.A.1
Paquet, J.2
Debbabi, M.3
Göbel, O.4
Frings, S.5
Günther, D.6
Nedon, J.7
Schadt, D.8
-
61
-
-
78249288445
-
-
Mokhov, S.A., Paquet, J., Debbabi, M.: Towards automatic deduction and event reconstruction using Forensic Lucid and probabilities to encode the IDS evidence. In: S. Jha, R. Sommer, C. Kreibich (eds.) Proceedings of Recent Advances in Intrusion Detection RAID’10, Lecture Notes in Computer Science (LNCS), vol. 6307, pp. 508–509. Springer, Berlin (2010)
-
Mokhov, S.A., Paquet, J., Debbabi, M.: Towards automatic deduction and event reconstruction using Forensic Lucid and probabilities to encode the IDS evidence. In: S. Jha, R. Sommer, C. Kreibich (eds.) Proceedings of Recent Advances in Intrusion Detection RAID’10, Lecture Notes in Computer Science (LNCS), vol. 6307, pp. 508–509. Springer, Berlin (2010). doi:10.1007/978-3-642-15512-3_36
-
-
-
-
62
-
-
84901684445
-
-
Mokhov, S.A., Paquet, J., Debbabi, M.: The use of NLP techniques in static code analysis to detect weaknesses and vulnerabilities. In: M. Sokolova, P. van Beek (eds.) Proceedings of Canadian Conference on AI’14, LNAI, vol. 8436, pp. 326–332. Springer, Berlin (2014). doi:. Short paper
-
Mokhov, S.A., Paquet, J., Debbabi, M.: The use of NLP techniques in static code analysis to detect weaknesses and vulnerabilities. In: M. Sokolova, P. van Beek (eds.) Proceedings of Canadian Conference on AI’14, LNAI, vol. 8436, pp. 326–332. Springer, Berlin (2014). doi:10.1007/978-3-319-06483-3_33. Short paper
-
-
-
-
63
-
-
85119160487
-
-
Mokhov, S.A., Paquet, J., Debbabi, M.: MARFCAT: Fast code analysis for defects and vulnerabilities. In: Proceedings of SWAN’15, pp. 35–38. IEEE (2015) (to appear)
-
Mokhov, S.A., Paquet, J., Debbabi, M.: MARFCAT: Fast code analysis for defects and vulnerabilities. In: Proceedings of SWAN’15, pp. 35–38. IEEE (2015) (to appear)
-
-
-
-
64
-
-
84964230479
-
Efficient polyphase FIR resampler for numpy: Native C/C++ implementation of the function upfirdn()
-
Motorola: Efficient polyphase FIR resampler for numpy: Native C/C++ implementation of the function upfirdn(). [online] (2009). http://code.google.com/p/upfirdn/source/browse/upfirdn
-
(2009)
[online]
-
-
-
65
-
-
84964230475
-
-
Murphy, K.P.: HMM toolbox. [online] (2002–2014)
-
Murphy, K.P.: HMM toolbox. [online] (2002–2014). http://www.cs.ubc.ca/murphyk/Software/HMM/hmm_download.html
-
-
-
-
67
-
-
63749095692
-
Detecting p2p botnets using a multi-phased flow model
-
IEEE Computer Society, Washington, DC
-
Noh, S.K., Oh, J.H., Lee, J.S., Noh, B.N., Jeong, H.C.: Detecting p2p botnets using a multi-phased flow model. In: International Conference on Digital Society, ICDS, pp. 247–253. IEEE Computer Society, Washington, DC (2009)
-
(2009)
International Conference on Digital Society, ICDS
, pp. 247-253
-
-
Noh, S.K.1
Oh, J.H.2
Lee, J.S.3
Noh, B.N.4
Jeong, H.C.5
-
68
-
-
84857855866
-
Comparisons of machine learning algorithms for application identification of encrypted traffic
-
Okada, Y., Ata, S., Nakamura, N., Nakahira, Y., Oka, I.: Comparisons of machine learning algorithms for application identification of encrypted traffic. In: Proceedings of the 10th International Conference on Machine Learning and Applications and Workshops (ICMLA), vol. 2, pp. 358–361 (2011)
-
(2011)
Proceedings of the 10th International Conference on Machine Learning and Applications and Workshops (ICMLA), vol. 2
, pp. 358-361
-
-
Okada, Y.1
Ata, S.2
Nakamura, N.3
Nakahira, Y.4
Oka, I.5
-
69
-
-
84964218530
-
-
Okun, V., Delaitre, A., Black, P.E., NIST SAMATE: Static Analysis Tool Exposition (SATE) 2010. [online] (2010). http://samate.nist.gov/SATE2010Workshop.html
-
(2010)
Black, P.E., NIST SAMATE: Static Analysis Tool Exposition (SATE)
, vol.2010
, Issue.[online]
-
-
Okun, V.1
Delaitre, A.2
-
70
-
-
84875606906
-
A non-convex classifier support for abstraction-refinement framework
-
Ouchani, S., Ait’Mohamed, O., Debbabi, M.: A non-convex classifier support for abstraction-refinement framework. In: 24th International Conference on Microelectronics (ICM), pp. 1–4 (2012)
-
(2012)
24th International Conference on Microelectronics (ICM)
, pp. 1-4
-
-
Ouchani, S.1
Ait’Mohamed, O.2
Debbabi, M.3
-
72
-
-
0033295259
-
Bro: a system for detecting network intruders in real-time
-
Paxson, V.: Bro: a system for detecting network intruders in real-time. Comput. Netw. 31(23–24), 2435–2463 (1999). http://www.icir.org/vern/papers/bro-CN99.pdf
-
(1999)
Comput. Netw
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
73
-
-
40649128309
-
Application of clustering methods to health insurance fraud detection
-
Peng, Y., Kou, G., Sabatka, A., Chen, Z., Khazanchi, D., Shi, Y.: Application of clustering methods to health insurance fraud detection. In: Proceedings of the 2006 International Conference on Service Systems and Service Management, vol. 1, pp. 116–120 (2006)
-
(2006)
Proceedings of the 2006 International Conference on Service Systems and Service Management, vol. 1
, pp. 116-120
-
-
Peng, Y.1
Kou, G.2
Sabatka, A.3
Chen, Z.4
Khazanchi, D.5
Shi, Y.6
-
74
-
-
61749083929
-
McPAD: a multiple classifier system for accurate payload-based anomaly detection
-
Perdisci, R., Ariu, D., Fogla, P., Giacinto, G., Lee, W.: McPAD: a multiple classifier system for accurate payload-based anomaly detection. Comput. Netw. 53(6), 864–881 (2009)
-
(2009)
Comput. Netw.
, vol.53
, Issue.6
, pp. 864-881
-
-
Perdisci, R.1
Ariu, D.2
Fogla, P.3
Giacinto, G.4
Lee, W.5
-
76
-
-
84958539163
-
On the reverse engineering of the Citadel botnet
-
Springer, Berlin
-
Rahimian, A., Ziarati, R., Preda, S., Debbabi, M.: On the reverse engineering of the Citadel botnet. In: Foundations and Practice of Security. Lecture Notes in Computer Science, pp. 408–425. Springer, Berlin (2014)
-
(2014)
Foundations and Practice of Security. Lecture Notes in Computer Science
, pp. 408-425
-
-
Rahimian, A.1
Ziarati, R.2
Preda, S.3
Debbabi, M.4
-
77
-
-
49949090311
-
Learning and classification of malware behavior
-
Springer, Berlin
-
Rieck, K., Holz, T., Willems, C., Düssel, P., Laskov, P.: Learning and classification of malware behavior. In: Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 108–125. Springer, Berlin (2008)
-
(2008)
Detection of Intrusions and Malware, and Vulnerability Assessment
, pp. 108-125
-
-
Rieck, K.1
Holz, T.2
Willems, C.3
Düssel, P.4
Laskov, P.5
-
78
-
-
35248844193
-
Comparative study of the baum-welch and viterbi training algorithms applied to read and spontaneous speech recognition
-
Springer, Berlin
-
Rodríguez, L.J., Torres, I.: Comparative study of the baum-welch and viterbi training algorithms applied to read and spontaneous speech recognition. In: Pattern Recognition and Image Analysis. Lecture Notes in Computer Science, vol. 2652, pp. 847–857. Springer, Berlin (2003)
-
(2003)
Pattern Recognition and Image Analysis. Lecture Notes in Computer Science, vol. 2652
, pp. 847-857
-
-
Rodríguez, L.J.1
Torres, I.2
-
79
-
-
79958728571
-
Sandnet: network traffic analysis of malicious software
-
ACM, New york
-
Rossow, C., Dietrich, C.J., Bos, H., Cavallaro, L., Van Steen, M., Freiling, F.C., Pohlmann, N.: Sandnet: network traffic analysis of malicious software. In: Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pp. 78–88. ACM, New york (2011)
-
(2011)
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security
, pp. 78-88
-
-
Rossow, C.1
Dietrich, C.J.2
Bos, H.3
Cavallaro, L.4
Van Steen, M.5
Freiling, F.C.6
Pohlmann, N.7
-
80
-
-
0003882234
-
-
Addison-Wesley, Boston, MA
-
Salton, G.: Automatic Text Processing: The Transformation, Analysis, and Retrieval of Information by Computer. Addison-Wesley, Boston, MA (1989)
-
(1989)
Automatic Text Processing: The Transformation, Analysis, and Retrieval of Information by Computer
-
-
Salton, G.1
-
81
-
-
84964218501
-
-
Schreiber, R.: MATLAB. Scholarpedia 2(6), 2929 (2007). doi:
-
Schreiber, R.: MATLAB. Scholarpedia 2(6), 2929 (2007). doi:10.4249/scholarpedia.2929. http://www.scholarpedia.org/article/MATLAB
-
-
-
-
82
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
Schultz, M.G., Eskin, E., Zadok, E., Stolfo, S.J.: Data mining methods for detection of new malicious executables. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 38–49. Oakland (2001)
-
(2001)
Proceedings of IEEE Symposium on Security and Privacy, pp. 38–49. Oakland
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, E.3
Stolfo, S.J.4
-
83
-
-
84930423347
-
-
Polytechnic University, Brooklyn, NY
-
Selesnick, I., Cai, S., Li, K., Sendur, L., Abdelnour, A.F.: MATLAB implementation of wavelet transforms. Tech. rep., Electrical Engineering, Polytechnic University, Brooklyn, NY (2003). http://taco.poly.edu/WaveletSoftware/
-
(2003)
MATLAB implementation of wavelet transforms. Tech. rep., Electrical Engineering
-
-
Selesnick, I.1
Cai, S.2
Li, K.3
Sendur, L.4
Abdelnour, A.F.5
-
84
-
-
33745474966
-
Scan detection: a data mining approach
-
SIAM, Philadelphia, PA
-
Simon, G.J., Xiong, H., Eilertson, E., Kumar, V.: Scan detection: a data mining approach. In: Proceedings of SDM 2006, pp. 118–129. SIAM, Philadelphia, PA (2006). http://www.siam.org/meetings/sdm06/proceedings/011simong.pdf
-
(2006)
Proceedings of SDM 2006
, pp. 118-129
-
-
Simon, G.J.1
Xiong, H.2
Eilertson, E.3
Kumar, V.4
-
85
-
-
84964204706
-
-
Sly Technologies Inc: jNetPcap OpenSource. [online] (2012)
-
Sly Technologies Inc: jNetPcap OpenSource. [online] (2012). http://www.jnetpcap.com/
-
-
-
-
86
-
-
84964281685
-
BitBlaze: Security via binary analysis
-
Song, D.: BitBlaze: Security via binary analysis. [online] (2010). http://bitblaze.cs.berkeley.edu
-
(2010)
[online]
-
-
Song, D.1
-
87
-
-
84964231077
-
WebBlaze: New techniques and tools for web security
-
Song, D.: WebBlaze: New techniques and tools for web security. [online] (2010). http://webblaze.cs.berkeley.edu
-
(2010)
[online]
-
-
Song, D.1
-
88
-
-
85180633963
-
Spectrogram: a mixture-of-markov-chains model for anomaly detection in web traffic
-
Song, Y., Keromytis, A.D., Stolfo, S.: Spectrogram: a mixture-of-markov-chains model for anomaly detection in web traffic. In: Proceedings of the Network and Distributed System Security Symposium, pp. 121–135. Internet Society (2009)
-
(2009)
Proceedings of the Network and Distributed System Security Symposium, pp. 121–135. Internet Society
-
-
Song, Y.1
Keromytis, A.D.2
Stolfo, S.3
-
89
-
-
84964204715
-
-
Sourcefire: Snort: open-source network intrusion prevention and detection system (IDS/IPS). [online] (1999–2015)
-
Sourcefire: Snort: open-source network intrusion prevention and detection system (IDS/IPS). [online] (1999–2015). http://www.snort.org/
-
-
-
-
90
-
-
85012240666
-
Data mining-based intrusion detectors: an overview of the Columbia IDS Project
-
Stolfo, S.J., Lee, W., Chan, P.K., Fan, W., Eskin, E.: Data mining-based intrusion detectors: an overview of the Columbia IDS Project. ACM SIGMOD Record 30(4), 5–14 (2001)
-
(2001)
ACM SIGMOD Record
, vol.30
, Issue.4
, pp. 5-14
-
-
Stolfo, S.J.1
Lee, W.2
Chan, P.K.3
Fan, W.4
Eskin, E.5
-
91
-
-
33750742739
-
A fast decision tree learning algorithm
-
Su, J., Zhang, H.: A fast decision tree learning algorithm. In: Proceedings of the 21st National Conference on Artificial Intelligence, AAAI’06, vol. 1, pp. 500–505. AAAI Press (2006)
-
(2006)
Proceedings of the 21st National Conference on Artificial Intelligence, AAAI’06, vol. 1, pp. 500–505. AAAI Press
-
-
Su, J.1
Zhang, H.2
-
92
-
-
84871993648
-
BotFinder: finding bots in network traffic without deep packet inspection
-
ACM, New York, NY
-
Tegeler, F., Fu, X., Vigna, G., Kruegel, C.: BotFinder: finding bots in network traffic without deep packet inspection. In: Proceedings of the 8th International Conference on Emerging Networking Experiments and Technologies, CoNEXT, pp. 349–360. ACM, New York, NY (2012)
-
(2012)
Proceedings of the 8th International Conference on Emerging Networking Experiments and Technologies, CoNEXT
, pp. 349-360
-
-
Tegeler, F.1
Fu, X.2
Vigna, G.3
Kruegel, C.4
-
93
-
-
84964215037
-
-
The Weka Project: Weka 3: data mining with open source machine learning software in Java. [online] (2006–2014)
-
The Weka Project: Weka 3: data mining with open source machine learning software in Java. [online] (2006–2014). http://www.cs.waikato.ac.nz/ml/weka/
-
-
-
-
94
-
-
57949113593
-
Payload content based network anomaly detection
-
Thorat, S.A., Khandelwal, A.K., Bruhadeshwar, B., Kishore, K.: Payload content based network anomaly detection. In: Proceedings of the First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2008), pp. 127–132. IEEE (2008)
-
(2008)
Proceedings of the First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2008), pp. 127–132. IEEE
-
-
Thorat, S.A.1
Khandelwal, A.K.2
Bruhadeshwar, B.3
Kishore, K.4
-
95
-
-
84964205716
-
ThreadAnalyzer: dynamic sandboxing and malware analysis (formerly GFI SandBox)
-
ThreatTrack Security: ThreadAnalyzer: dynamic sandboxing and malware analysis (formerly GFI SandBox). [online] (2013). http://www.threattracksecurity.com/enterprise-security/sandbox-software.aspx
-
(2013)
[online]
-
-
-
96
-
-
84964216885
-
-
K.: A malware instruction set for behavior-based analysis
-
Trinius, P., Willems, C., Holz, T., Rieck, K.: A malware instruction set for behavior-based analysis (2011)
-
(2011)
Rieck
-
-
Trinius, P.1
Willems, C.2
Holz, T.3
-
98
-
-
35048885009
-
Anomalous payload-based network intrusion detection
-
Springer, Berlin
-
Wang, K., Stolfo, S.J.: Anomalous payload-based network intrusion detection. In: Recent Advances in Intrusion Detection, pp. 203–222. Springer, Berlin (2004)
-
(2004)
Recent Advances in Intrusion Detection
, pp. 203-222
-
-
Wang, K.1
Stolfo, S.J.2
-
99
-
-
84937721541
-
Model aggregation for distributed content anomaly detection
-
ACM, New York
-
Whalen, S., Boggs, N., Stolfo, S.J.: Model aggregation for distributed content anomaly detection. In: Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, pp. 61–71. ACM, New York (2014)
-
(2014)
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop
, pp. 61-71
-
-
Whalen, S.1
Boggs, N.2
Stolfo, S.J.3
-
101
-
-
84964205732
-
-
Wireless and Secure Networks Research Lab: WISNET: downloads. [online] (2009–2014)
-
Wireless and Secure Networks Research Lab: WISNET: downloads. [online] (2009–2014). http://wisnet.seecs.nust.edu.pk/downloads.php
-
-
-
-
102
-
-
84964293951
-
Network forensics of partial SSL/TLS encrypted traffic classification using clustering algorithms
-
Wu, M.D., Wolfthusen, S.D.: Network forensics of partial SSL/TLS encrypted traffic classification using clustering algorithms. In: O. Göbel, S. Frings, D. Günther, J. Nedon, D. Schadt (eds.) Proceedings of the IT Incident Management and IT Forensics (IMF’08), LNI140, pp. 157–172 (2008)
-
(2008)
O. Göbel, S. Frings, D. Günther, J. Nedon, D. Schadt (eds.) Proceedings of the IT Incident Management and IT Forensics (IMF’08), LNI140
, pp. 157-172
-
-
Wu, M.D.1
Wolfthusen, S.D.2
-
103
-
-
49949094072
-
Traffic aggregation for malware detection
-
Springer, Berlin
-
Yen, T.F., Reiter, M.K.: Traffic aggregation for malware detection. In: Proceedings of the 5th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA, pp. 207–227. Springer, Berlin (2008)
-
(2008)
Proceedings of the 5th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA
, pp. 207-227
-
-
Yen, T.F.1
Reiter, M.K.2
-
104
-
-
33745165284
-
Analyzing TCP traffic patterns using self organizing maps
-
Springer, Berlin
-
Zanero, S.: Analyzing TCP traffic patterns using self organizing maps. In: Image Analysis and Processing (ICIAP 2005), pp. 83–90. Springer, Berlin (2005)
-
(2005)
Image Analysis and Processing (ICIAP 2005)
, pp. 83-90
-
-
Zanero, S.1
-
107
-
-
84964204728
-
-
The Massive Spy Malware Infiltrating Iranian Computers, WIRED
-
Zetter, K.: Meet ‘Flame’, The Massive Spy Malware Infiltrating Iranian Computers. WIRED (2012). http://www.wired.com/threatlevel/2012/05/flame/
-
(2012)
Meet ‘Flame’
-
-
Zetter, K.1
-
108
-
-
84888643750
-
A distributed framework for demand-driven software vulnerability detection
-
Zhang, D., Liu, D., Csallner, C., Kung, D., Lei, Y.: A distributed framework for demand-driven software vulnerability detection. J. Syst. Softw. 87, 60–73 (2014). doi:10.1016/j.jss.2013.08.033
-
(2014)
J. Syst. Softw.
, vol.87
, pp. 60-73
-
-
Zhang, D.1
Liu, D.2
Csallner, C.3
Kung, D.4
Lei, Y.5
-
110
-
-
24044537630
-
Hierarchical clustering algorithms for document datasets
-
Zhao, Y., Karypis, G., Fayyad, U.: Hierarchical clustering algorithms for document datasets. Data Min. Knowl. Discov. 10(2), 141–168 (2005)
-
(2005)
Data Min. Knowl. Discov.
, vol.10
, Issue.2
, pp. 141-168
-
-
Zhao, Y.1
Karypis, G.2
Fayyad, U.3
-
111
-
-
24944501423
-
Generative model-based document clustering: a comparative study
-
Zhong, S., Ghosh, J.: Generative model-based document clustering: a comparative study. Knowl. Inf. Syst. 8(3), 374–384 (2005)
-
(2005)
Knowl. Inf. Syst.
, vol.8
, Issue.3
, pp. 374-384
-
-
Zhong, S.1
Ghosh, J.2
|