首页
查找话题
首页
深度学习在信息安全的应用有哪些可以关注的人或论文?
深度学习在信息安全的应用有哪些可以关注的人或论文? 第1页
1
zhu-wang-xiao-miao-o 网友的相关建议:
机器学习与网络安全
入侵检测
A Close Look on n-Grams in Intrusion Detection- Anomaly Detection vs. Classification
A Framework for the Application of Association Rule Mining in Large Intrusion Detection Infrastructures
A Kill Chain Analysis of the 2013 Target Data Breach
A Lone Wolf No More - Supporting Network Intrusion Detection with Real-Time Intelligence
A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks
Acquiring Digital Evidence from Botnet Attacks: Procedures and Methods (PhD Thesis)
ALERT-ID - Analyze Logs of the network Element in Real Time for Intrusion Detection
Anagram - A Content Anomaly Detector Resistant to Mimicry Attack
Anagram - A Content Anomaly Detector Resistant to Mimicry Attack
Anomaly-based Intrusion Detection in Software as a Service
Application of the PageRank Algorithm to Alarm Graphs
Back to Basics - Beyond Network Hygiene
Beehive - Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks
Behavioral Clustering of HTTP-based Malware and Signature Generation Using Malicious Network Traces
Beheading Hydras - Performing Effective Botnet Takedowns
Bloodhound - Searching Out Malicious Input in Network Flows for Automatic Repair Validation
Boosting the Scalability of Botnet Detection Using Adaptive Traffic Sampling
CAMP - Content Agnostic Malware Protection
CAMP - Content Agnostic Malware Protection
Casting out demons - Sanitizing training data for anomaly sensors
CloudFence - Data Flow Tracking as a Cloud Service
Comparing anomaly detection techniques for HTTP
Cujo - Efficient detection and prevention of drive-by-download attacks
Decoy Document Deployment for Effective Masquerade Attack Detection
Detecting Spammers with SNARE - Spatio-temporal Network-level Automatic Reputation Engine
Detecting Unknown Network Attacks Using Language Models
Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis
Effective Anomaly Detection with Scarce Training Data
Efficient Multidimensional Aggregation for Large Scale Monitoring
EFFORT - Efficient and Effective Bot Malware Detection
ExecScent- Mining for New C and C Domains in Live Networks with Adaptive Control Protocol Templates - slides
ExecScent- Mining for New C and C Domains in Live Networks with Adaptive Control Protocol Templates
EXPOSURE - Finding Malicious Domains Using Passive DNS Analysis
EXPOSURE - Finding Malicious Domains Using Passive DNS Analysis
FiG - Automatic Fingerprint Generation
Filtering Spam with Behavioral Blacklisting
Finding The Needle - Suppression of False Alarms in Large Intrusion Detection Data Sets
FLIPS - Hybrid Adaptive Intrusion Prevention
Heuristics for Improved Enterprise Intrusion Detection
by Jim Treinen
HMMPayl - An Intrusion Detection System Based on Hidden Markov Models
Kopis - Detecting malware domains at the upper dns hierarchy
Kopis - Detecting malware domains at the upper dns hierarchy
Large-Scale Malware Analysis, Detection, and Signature Generation
Leveraging Honest Users - Stealth Command-and-Control of Botnets - slides
Leveraging Honest Users - Stealth Command-and-Control of Botnets
Local System Security via SSHD Instrumentation
Machine Learning In Adversarial Environments
Malware vs. Big Data (Umbrella Labs)
McPAD - A Multiple Classifier System for Accurate Payload-based Anomaly Detection
Measuring and Detecting Malware Downloads in Live Network Traffic
Mining Botnet Sink Holes - slides
MISHIMA - Multilateration of Internet hosts hidden using malicious fast-flux agents
Monitoring the Initial DNS Behavior of Malicious Domains
N-Gram against the Machine - On the Feasibility of the N-Gram Network Analysis for Binary Protocols
Nazca - Detecting Malware Distribution in Large-Scale Networks
Nazca - Detecting Malware Distribution in Large-Scale Networks
Netgator - Malware Detection Using Program Interactive Challenges - slides
Network Traffic Characterization Using (p, n)-grams Packet Representation
Notos - Building a Dynamic Reputation System for DNS
Notos - Building a Dynamic Reputation System for DNS
On the Feasibility of Online Malware Detection with Performance Counters
On the Infeasibility of Modeling Polymorphic Shellcode
On the Mismanagement and Maliciousness of Networks
Outside the Closed World - On Using Machine Learning For Network Intrusion Detection
PAYL - Anomalous Payload-based Network Intrusion Detection
PAYL - Anomalous Payload-based Network Intrusion Detection
PAYL2 - Anomalous Payload-based Worm Detection and Signature Generation
Pleiades - From Throw-away Traffic To Bots - Detecting The Rise Of DGA-based Malware
Pleiades - From Throw-away Traffic To Bots - Detecting The Rise Of DGA-based Malware
Polonium - Tera-Scale Graph Mining for Malware Detection
Practical Comprehensive Bounds on Surreptitious Communication Over DNS - slides
Practical Comprehensive Bounds on Surreptitious Communication Over DNS
Privacy-preserving Payload-based Correlation for Accurate Malicious Traffic Detection
Revealing Botnet Membership Using DNSBL Counter-Intelligence
Revolver - An Automated Approach to the Detection of Evasive Web-based Malware
Self-organized Collaboration of Distributed IDS Sensors
SinkMiner- Mining Botnet Sinkholes for Fun and Profit
Spamming Botnets - Signatures and Characteristics
Spectrogram - A Mixture of Markov Chain models for Anomaly Detection in Web Traffic
The Security of Machine Learning
Toward Stealthy Malware Detection
Traffic Aggregation for Malware Detection
Understanding the Domain Registration Behavior of Spammers
Understanding the Network-Level Behavior of Spammers
VAST- Network Visibility Across Space and Time
恶意软件
A static, packer-agnostic filter to detect similar malware samples
A study of malcode-bearing documents
A survey on automated dynamic malware-analysis techniques and tools
APT1 Technical backstage (malware.lu hack backs of APT1 servers)
Automatic Analysis of Malware Behavior using Machine Learning
BitShred - Fast, Scalable Code Reuse Detection in Binary Code
BitShred - Fast, Scalable Malware Triage
Deobfuscating Embedded Malware using Probable-Plaintext Attacks
Escape from Monkey Island - Evading High-Interaction Honeyclients
Eureka - A framework for enabling static malware analysis
Extraction of Statistically Significant Malware Behaviors
Fast Automated Unpacking and Classification of Malware
FIRMA - Malware Clustering and Network Signature Generation with Mixed Network Behaviors
FuncTracker - Discovering Shared Code (to aid malware forensics) - slides
FuncTracker - Discovering Shared Code to Aid Malware Forensics Extended Abstract
Malware files clustering based on file geometry and visualization using R language
Mobile Malware Detection Based on Energy Fingerprints — A Dead End
Polonium - Tera-Scale Graph Mining for Malware Detection
Putting out a HIT - Crowdsourcing Malware Installs
Scalable Fine-grained Behavioral Clustering of HTTP-based Malware
Selecting Features to Classify Malware
by Karthik Raman
SigMal - A Static Signal Processing Based Malware Triage
Tracking Memory Writes for Malware Classification and Code Reuse Identification
Using File Relationships in Malware Classification
VAMO - Towards a Fully Automated Malware Clustering Validity Analysis
数据收集
Crawling BitTorrent DHTs for Fun and Profit
CyberProbe - Towards Internet-Scale Active Detection of Malicious Servers
Demystifying service discovery - Implementing an internet-wide scanner
gitDigger - Creating useful wordlists from GitHub
PoisonAmplifier - A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks
ZMap - Fast Internet-Wide Scanning and its Security Applications (slides)
ZMap - Fast Internet-Wide Scanning and its Security Applications
漏洞分析/逆向
A Preliminary Analysis of Vulnerability Scores for Attacks in Wild
Attacker Economics for Internet-scale Vulnerability Risk Assessment
Detecting Logic Vulnerabilities in E-Commerce Applications
ReDeBug - Finding Unpatched Code Clones in Entire OS Distributions
The Classification of Valuable Data in an Assumption of Breach Paradigm
Toward Black-Box Detection of Logic Flaws in Web Applications
Vulnerability Extrapolation - Assisted Discovery of Vulnerabilities using Machine Learning - slides
Vulnerability Extrapolation - Assisted Discovery of Vulnerabilities using Machine Learning
匿名/隐私/审查
Anonymous Hacking Group – #OpNewblood Super Secret Security Handbook
Detecting Traffic Snooping in Tor Using Decoys
Risks and Realization of HTTPS Traffic Analysis
Selling Off Privacy at Auction
The Sniper Attack - Anonymously Deanonymizing and Disabling the Tor Network
The Velocity of Censorship - High-Fidelity Detection of Microblog Post Deletions - slides
The Velocity of Censorship - High-Fidelity Detection of Microblog Post Deletions
Tor vs. NSA
数据挖掘
An Exploration of Geolocation and Traffic Visualization Using Network Flows to Aid in Cyber Defense
DSpin - Detecting Automatically Spun Content on the Web
Gyrus - A Framework for User-Intent Monitoring of Text-Based Networked Applications
Indexing Million of Packets per Second using GPUs
Multi-Label Learning with Millions of Labels - Recommending Advertiser Bid Phrases for Web Pages
Real-Time Handling of Network Monitoring Data Using a Data-Intensive Framework
Shingled Graph Disassembly - Finding the Undecideable Path
Synoptic Graphlet - Bridging the Gap between Supervised and Unsupervised Profiling of Host-level Network Traffic
APT与网络犯罪
Connected Colors - Unveiling the Structure of Criminal Networks
Image Matching for Branding Phishing Kit Images - slides
Image Matching for Branding Phishing Kit Images
Inside a Targeted Point-of-Sale Data Breach
Investigating Advanced Persistent Threat 1 (APT1)
Measuring pay-per-install - the Commoditization of Malware Distribution
Scambaiter - Understanding Targeted Nigerian Scams on Craigslist
Sherlock Holmes and the Case of the Advanced Persistent Threat
The Role of the Underground Market in Twitter Spam and Abuse
The Tangled Web of Password Reuse
Trafficking Fraudulent Accounts - The Role of the Underground Market in Twitter Spam and Abuse
CND/CNA/CNE/CNO
Amplification Hell - Revisiting Network Protocols for DDoS Abuse
Defending The Enterprise, the Russian Way
Protecting a Moving Target - Addressing Web Application Concept Drift
Timing of Cyber Conflict
深度学习与网络安全
A Deep Learning Approach for Network Intrusion Detection System
A Hybrid Malicious Code Detection Method based on Deep Learning
A Hybrid Spectral Clustering and Deep Neural Network Ensemble Algorithm for Intrusion Detection in Sensor Networks
A Multi-task Learning Model for Malware Classification with Useful File Access Pattern from API Call Sequence
A Novel LSTM-RNN Decoding Algorithm in CAPTCHA Recognition
(Short paper)
An Analysis of Recurrent Neural Networks for Botnet Detection Behavior
Application of Recurrent Neural Networks for User Verification based on Keystroke Dynamics
Applications of Deep Learning On Traffic Identification
(video:
here
)
Combining Restricted Boltzmann Machine and One Side Perceptron for Malware Detection
Comparison Deep Learning Method to Traditional Methods Using for Network Intrusion Detection
(short paper)
Convolutional Neural Networks for Malware Classification
(THESIS)
Deep Learning Approach for Network Intrusion Detection in Software Defined Networking
Deep Learning for Classification of Malware System Call Sequences
Deep Learning for Zero-day Flash Malware Detection
(Short Paper)
Deep Learning is a Good Steganalysis Tool When Embedding Key is Reused for Different Images, even if there is a cover source mismatch
Deep Learning-based Feature Selection for Intrusion Detection System in Transport Layer
(Short Paper)
Deep Neural Network Based Malware Detection using Two Dimensional Binary Program Features
DeepDGA: Adversarially-Tuned Domain Generation and Detection
DeepSign: Deep Learning for Automatic Malware Signature Generation and Classification
DL4MD: A Deep Learning Framework for Intelligent Malware Detection
Droid-Sec: Deep Learning in Android Malware Detection
DroidDetector: Android Malware Characterization and Detection using Deep Learning
HADM: Hybrid Analysis for Detection of Malware
Identifying Top Sellers In Underground Economy Using Deep Learning-based Sentiment Analysis
Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security
Large-scale Malware Classification using Random Projections and Neural Networks
Learning a Static Analyzer: A Case Study on a Toy Language
Learning Spam Features using Restricted Boltzmann Machines
Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection
LSTM-based System-call Language Modeling and Robust Ensemble Method for Designing Host-based Intrusion Detection Systems
Malware Classification on Time Series Data Through Machine Learning
(THESIS)
Malware Classification with Recurrent Networks
Malware Detection with Deep Neural Network using Process Behavior
MS-LSTM: a Multi-Scale LSTM Model for BGP Anomaly Detection
MtNet: A Multi-Task Neural Network for Dynamic Malware Classification
Network Anomaly Detection with the Restricted Boltzmann Machine
Predicting Domain Generation Algorithms with Long Short-Term Memory Networks
Recognizing Functions in Binaries with Neural Networks
The Limitations of Deep Learning in Adversarial Settings
Toward large-scale vulnerability discovery using Machine Learning
顺便放着这里做个备份,以后慢慢读~
深度学习在信息安全的应用有哪些可以关注的人或论文? 的其他答案 点击这里
1
相关话题
为什么现在很多人对网络空间安全专业持劝退态度?
如何理解深度学习中的deconvolution networks?
如何看待 Steam 最近爆出的 0day 漏洞?
人是如何做黑盒优化的?
如何评价 CVPR 2020的论文接收结果?有哪些亮点论文?
深度学习在信息安全的应用有哪些可以关注的人或论文?
如何看待国家网信办等七部门进驻滴滴开展网络安全?
如何评价Google最新提出的gMLP:MLP模型在CV和NLP任务上均取得较好的效果?
如何看待Jeff Dean&Hinton投到ICLR17的MoE的工作?
个人信息保护法 11 月 1 日正式实施,将产生什么影响?有哪些方面的解读?
前一个讨论
机器学习算法工程师如何自己接项目单干、并赚取比上班多得多的收入?
下一个讨论
对于稻城亚丁,你还会去第二次吗?
相关的话题
国内做NLP业务的香侬科技值得去吗?
如何看待Jeff Dean&Hinton投到ICLR17的MoE的工作?
如何看待 Nervana 被 Intel 收购?
现在的BERT等语言模型,最快训练要多久?
各种浏览器的隐私/无痕模式能否真的能够解决隐私问题?
把某人的 DNA 序列作为输入,正面照片作为输出,丢到深度神经网络里面学习,可行吗?
在算力充沛,深度学习模型大行其道的今天,传统机器学习的未来在哪里?
人工智能 CV 岗位是不是现在供严重大于需?
XcodeGhost 事件会造成什么影响?
机器学习中的机器是如何分辨哪些是有用的知识,哪些是没用的信息呢?
为什么网络上有关青少年的灰色内容层出不穷?背后是否存在产业链等利益因素?
如何看待 8 月 1 日开始实施的 App 注册实名认证规定?
新智元提问:如何看待李飞飞高徒Karpathy加入特斯拉,主管人工智能部门?
课堂上传纸条如何防范中间人攻击?
对电脑一点都不了解可以学习信息安全技术吗?
Google 的神经网络生成图像 (Inceptionism) 是怎么做到的?
为什么以色列的网络安全,存储方面这么有竞争力?
经过足够长的时间, AlphaGo 的棋谱能收敛到一张上吗?
使用pytorch时,训练集数据太多达到上千万张,Dataloader加载很慢怎么办?
实验室只有1080的显卡,老师还想让发深度学习论文,也不给配置好的显卡怎么办?
神经网络为什么可以(理论上)拟合任何函数?
全球最大肉食品加工商遭网络攻击关停,白宫称:黑客可能来自俄罗斯,事实可能是怎么样的?
深度学习如何入门?
什么是哈希洪水攻击(Hash-Flooding Attack)?
如何评价 Self-Normalizing Neural Networks 这篇论文?
如何看待云舒离开阿里巴巴?
人工智能的意义和价值是什么?
AMD 开源高性能机器智能库MIopen是否可以和cuDNN抗衡?
Resnet到底在解决一个什么问题呢?
如何评价余凯创立的horizon robotics?
服务条款
联系我们
关于我们
隐私政策
© 2025-01-18 - tinynew.org. All Rights Reserved.
© 2025-01-18 - tinynew.org. 保留所有权利