-
4
-
-
79960360109
-
Malware analysis with tree automata inference
-
Springer
-
D. Babić, D. Reynaud, and D. Song. Malware analysis with tree automata inference. In Computer Aided Verification, pages 116-131. Springer, 2011.
-
(2011)
Computer Aided Verification
, pp. 116-131
-
-
Babić, D.1
Reynaud, D.2
Song, D.3
-
7
-
-
36949029788
-
Towards highly reliable enterprise network services via inference of multi-level dependencies
-
August
-
P. V. Bahl, R. Chandra, A. Greenberg, S. Kandula, D. Maltz, and M. Zhang. Towards highly reliable enterprise network services via inference of multi-level dependencies. In Proceedings of ACM SIGCOMM, August 2007.
-
(2007)
Proceedings of ACM SIGCOMM
-
-
Bahl, P.V.1
Chandra, R.2
Greenberg, A.3
Kandula, S.4
Maltz, D.5
Zhang, M.6
-
9
-
-
85076921594
-
Automating network application dependency discovery: Experiences, limitations, and new solutions
-
USENIX Association
-
X. Chen, M. Zhang, Z. M. Mao, and P. Bahl. Automating network application dependency discovery: Experiences, limitations, and new solutions. In Proceedings of OSDI, pages 117-130, 2008. USENIX Association.
-
(2008)
Proceedings of OSDI
, pp. 117-130
-
-
Chen, X.1
Zhang, M.2
Mao, Z.M.3
Bahl, P.4
-
11
-
-
58049219641
-
Mining specifications of malicious behavior
-
M. Christodorescu, S. Jha, and C. Kruegel. Mining specifications of malicious behavior. In ISEC, pages 5-14, 2008.
-
(2008)
ISEC
, pp. 5-14
-
-
Christodorescu, M.1
Jha, S.2
Kruegel, C.3
-
12
-
-
34249753618
-
Support-vector networks
-
C. Cortes and V. Vapnik. Support-vector networks. Machine learning, 20(3):273-297, 1995.
-
(1995)
Machine Learning
, vol.20
, Issue.3
, pp. 273-297
-
-
Cortes, C.1
Vapnik, V.2
-
17
-
-
70149108553
-
Visual analytics for complex concepts using a human cognition model
-
IEEE
-
T. M. Green, W. Ribarsky, and B. Fisher. Visual analytics for complex concepts using a human cognition model. In Visual Analytics Science and Technology, 2008. VAST'08. IEEE Symposium on, pages 91-98. IEEE, 2008.
-
(2008)
Visual Analytics Science and Technology, 2008. VAST'08. IEEE Symposium on
, pp. 91-98
-
-
Green, T.M.1
Ribarsky, W.2
Fisher, B.3
-
25
-
-
85076206522
-
Effective and efficient malware detection at the end host
-
C. Kolbitsch, P. M. Comparetti, C. Kruegel, E. Kirda, X.-y. Zhou, and X. Wang. Effective and efficient malware detection at the end host. In USENIX Security Symposium, pages 351-366, 2009.
-
(2009)
USENIX Security Symposium
, pp. 351-366
-
-
Kolbitsch, C.1
Comparetti, P.M.2
Kruegel, C.3
Kirda, E.4
Zhou, X.-Y.5
Wang, X.6
-
26
-
-
0032676506
-
A data mining framework for building intrusion detection models
-
IEEE
-
W. Lee, S. J. Stolfo, and K. W. Mok. A data mining framework for building intrusion detection models. In Security and Privacy, 1999. Proceedings of the 1999 IEEE Symposium on, pages 120-132. IEEE, 1999.
-
(1999)
Security and Privacy, 1999. Proceedings of the 1999 IEEE Symposium on
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
27
-
-
85076740771
-
WebProphet: Automating performance prediction for web services
-
Z. Li, M. Zhang, Z. Zhu, Y. Chen, A. G. Greenberg, and Y.-M. Wang. WebProphet: Automating performance prediction for web services. In NSDI, volume 10, 2010.
-
(2010)
NSDI
, vol.10
-
-
Li, Z.1
Zhang, M.2
Zhu, Z.3
Chen, Y.4
Greenberg, A.G.5
Wang, Y.-M.6
-
30
-
-
46149123241
-
Using machine learning techniques to identify botnet traffic
-
C. Livadas, R. Walsh, D. Lapsley, and W. T. Strayer. Using machine learning techniques to identify botnet traffic. In 2nd IEEE LCN Workshop on Network Security (WoNS) 2006, pages 967-974, 2006.
-
(2006)
2nd IEEE LCN Workshop on Network Security (WoNS)
, vol.2006
, pp. 967-974
-
-
Livadas, C.1
Walsh, R.2
Lapsley, D.3
Strayer, W.T.4
-
31
-
-
84861608741
-
NSDMiner: Automated discovery of network service dependencies
-
A. Natarajan, P. Ning, Y. Liu, S. Jajodia, and S. E. Hutchinson. NSDMiner: Automated discovery of network service dependencies. In INFOCOM, pages 2507-2515, 2012.
-
(2012)
INFOCOM
, pp. 2507-2515
-
-
Natarajan, A.1
Ning, P.2
Liu, Y.3
Jajodia, S.4
Hutchinson, S.E.5
-
32
-
-
62849120844
-
A survey of techniques for internet traffic classification using machine learning
-
T. T. T. Nguyen and G. J. Armitage. A survey of techniques for internet traffic classification using machine learning. IEEE Communications Surveys and Tutorials, 10(1-4):56-76, 2008.
-
(2008)
IEEE Communications Surveys and Tutorials
, vol.10
, Issue.1-4
, pp. 56-76
-
-
Nguyen, T.T.T.1
Armitage, G.J.2
-
33
-
-
84984866623
-
-
Panda Security Report. 2013. http://press.pandasecurity.com/press-room/reports/.
-
(2013)
Panda Security Report
-
-
-
34
-
-
84984908980
-
-
Botnet Pony 1.9 Malware. http://laboratoriomalware. blogspot.com/2013/01/botnet-pony-19-malware.html.
-
Botnet Pony 1.9 Malware
-
-
-
35
-
-
70350394979
-
Database intrusion detection using weighted sequence mining
-
A. Srivastava, S. Sural, and A. Majumdar. Database intrusion detection using weighted sequence mining. Journal of Computers, 1(4):8-17, 2006.
-
(2006)
Journal of Computers
, vol.1
, Issue.4
, pp. 8-17
-
-
Srivastava, A.1
Sural, S.2
Majumdar, A.3
-
37
-
-
84866613774
-
$100, 000 prize jackpot. Call now!: Identifying the pertinent features of SMS spam
-
ACM
-
H. Tan, N. Goharian, and M. Sherr. $100, 000 prize jackpot. Call now!: Identifying the pertinent features of SMS spam. In Proceedings of the 35th international ACM SIGIR conference on Research and development in information retrieval, pages 1175-1176. ACM, 2012.
-
(2012)
Proceedings of the 35th International ACM SIGIR Conference on Research and Development in Information Retrieval
, pp. 1175-1176
-
-
Tan, H.1
Goharian, N.2
Sherr, M.3
-
38
-
-
33750283653
-
A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification
-
5-16, Oct
-
N. Williams, S. Zander, and G. Armitage. A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification. SIGCOMM Comput. Commun. Rev., 36(5):5-16, Oct. 2006.
-
(2006)
SIGCOMM Comput. Commun. Rev
, vol.36
, pp. 5
-
-
Williams, N.1
Zander, S.2
Armitage, G.3
-
39
-
-
77956574602
-
Using Bayesian networks for cyber security analysis
-
IEEE
-
P. Xie, J. H. Li, X. Ou, P. Liu, and R. Levy. Using Bayesian networks for cyber security analysis. In Dependable Systems and Networks (DSN), 2010 IEEE/IFIP International Conference on, pages 211-220. IEEE, 2010.
-
(2010)
Dependable Systems and Networks (DSN), 2010 IEEE/IFIP International Conference on
, pp. 211-220
-
-
Xie, P.1
Li, J.H.2
Ou, X.3
Liu, P.4
Levy, R.5
-
40
-
-
84877294495
-
DNS for massive-scale command and control
-
K. Xu, P. Butler, S. Saha, and D. Yao. DNS for massive-scale command and control. IEEE Trans. Dependable Sec. Comput., 10(3):143-153, 2013.
-
(2013)
IEEE Trans. Dependable Sec. Comput
, vol.10
, Issue.3
, pp. 143-153
-
-
Xu, K.1
Butler, P.2
Saha, S.3
Yao, D.4
-
41
-
-
84863028103
-
Data-provenance verification for secure hosts
-
K. Xu, H. Xiong, C. Wu, D. Stefan, and D. Yao. Data-provenance verification for secure hosts. IEEE Trans. Dependable Sec. Comput., 9(2):173-183, 2012.
-
(2012)
IEEE Trans. Dependable Sec. Comput
, vol.9
, Issue.2
, pp. 173-183
-
-
Xu, K.1
Xiong, H.2
Wu, C.3
Stefan, D.4
Yao, D.5
-
42
-
-
84863160317
-
Die free or live hard? Empirical evaluation and new design for fighting evolving twitter spammers
-
Springer
-
C. Yang, R. C. Harkreader, and G. Gu. Die free or live hard? Empirical evaluation and new design for fighting evolving twitter spammers. In Recent Advances in Intrusion Detection, pages 318-337. Springer, 2011.
-
(2011)
Recent Advances in Intrusion Detection
, pp. 318-337
-
-
Yang, C.1
Harkreader, R.C.2
Gu, G.3
-
44
-
-
84864242247
-
User intention-based traffic dependence analysis for anomaly detection
-
IEEE
-
H. Zhang, W. Banick, D. Yao, and N. Ramakrishnan. User intention-based traffic dependence analysis for anomaly detection. In Security and Privacy Workshops (SPW), 2012 IEEE Symposium on, pages 104-112. IEEE, 2012.
-
(2012)
Security and Privacy Workshops (SPW), 2012 IEEE Symposium on
, pp. 104-112
-
-
Zhang, H.1
Banick, W.2
Yao, D.3
Ramakrishnan, N.4
|