首页
查找话题
首页
深度学习在信息安全的应用有哪些可以关注的人或论文?
深度学习在信息安全的应用有哪些可以关注的人或论文? 第1页
1
zhu-wang-xiao-miao-o 网友的相关建议:
机器学习与网络安全
入侵检测
A Close Look on n-Grams in Intrusion Detection- Anomaly Detection vs. Classification
A Framework for the Application of Association Rule Mining in Large Intrusion Detection Infrastructures
A Kill Chain Analysis of the 2013 Target Data Breach
A Lone Wolf No More - Supporting Network Intrusion Detection with Real-Time Intelligence
A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks
Acquiring Digital Evidence from Botnet Attacks: Procedures and Methods (PhD Thesis)
ALERT-ID - Analyze Logs of the network Element in Real Time for Intrusion Detection
Anagram - A Content Anomaly Detector Resistant to Mimicry Attack
Anagram - A Content Anomaly Detector Resistant to Mimicry Attack
Anomaly-based Intrusion Detection in Software as a Service
Application of the PageRank Algorithm to Alarm Graphs
Back to Basics - Beyond Network Hygiene
Beehive - Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks
Behavioral Clustering of HTTP-based Malware and Signature Generation Using Malicious Network Traces
Beheading Hydras - Performing Effective Botnet Takedowns
Bloodhound - Searching Out Malicious Input in Network Flows for Automatic Repair Validation
Boosting the Scalability of Botnet Detection Using Adaptive Traffic Sampling
CAMP - Content Agnostic Malware Protection
CAMP - Content Agnostic Malware Protection
Casting out demons - Sanitizing training data for anomaly sensors
CloudFence - Data Flow Tracking as a Cloud Service
Comparing anomaly detection techniques for HTTP
Cujo - Efficient detection and prevention of drive-by-download attacks
Decoy Document Deployment for Effective Masquerade Attack Detection
Detecting Spammers with SNARE - Spatio-temporal Network-level Automatic Reputation Engine
Detecting Unknown Network Attacks Using Language Models
Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis
Effective Anomaly Detection with Scarce Training Data
Efficient Multidimensional Aggregation for Large Scale Monitoring
EFFORT - Efficient and Effective Bot Malware Detection
ExecScent- Mining for New C and C Domains in Live Networks with Adaptive Control Protocol Templates - slides
ExecScent- Mining for New C and C Domains in Live Networks with Adaptive Control Protocol Templates
EXPOSURE - Finding Malicious Domains Using Passive DNS Analysis
EXPOSURE - Finding Malicious Domains Using Passive DNS Analysis
FiG - Automatic Fingerprint Generation
Filtering Spam with Behavioral Blacklisting
Finding The Needle - Suppression of False Alarms in Large Intrusion Detection Data Sets
FLIPS - Hybrid Adaptive Intrusion Prevention
Heuristics for Improved Enterprise Intrusion Detection
by Jim Treinen
HMMPayl - An Intrusion Detection System Based on Hidden Markov Models
Kopis - Detecting malware domains at the upper dns hierarchy
Kopis - Detecting malware domains at the upper dns hierarchy
Large-Scale Malware Analysis, Detection, and Signature Generation
Leveraging Honest Users - Stealth Command-and-Control of Botnets - slides
Leveraging Honest Users - Stealth Command-and-Control of Botnets
Local System Security via SSHD Instrumentation
Machine Learning In Adversarial Environments
Malware vs. Big Data (Umbrella Labs)
McPAD - A Multiple Classifier System for Accurate Payload-based Anomaly Detection
Measuring and Detecting Malware Downloads in Live Network Traffic
Mining Botnet Sink Holes - slides
MISHIMA - Multilateration of Internet hosts hidden using malicious fast-flux agents
Monitoring the Initial DNS Behavior of Malicious Domains
N-Gram against the Machine - On the Feasibility of the N-Gram Network Analysis for Binary Protocols
Nazca - Detecting Malware Distribution in Large-Scale Networks
Nazca - Detecting Malware Distribution in Large-Scale Networks
Netgator - Malware Detection Using Program Interactive Challenges - slides
Network Traffic Characterization Using (p, n)-grams Packet Representation
Notos - Building a Dynamic Reputation System for DNS
Notos - Building a Dynamic Reputation System for DNS
On the Feasibility of Online Malware Detection with Performance Counters
On the Infeasibility of Modeling Polymorphic Shellcode
On the Mismanagement and Maliciousness of Networks
Outside the Closed World - On Using Machine Learning For Network Intrusion Detection
PAYL - Anomalous Payload-based Network Intrusion Detection
PAYL - Anomalous Payload-based Network Intrusion Detection
PAYL2 - Anomalous Payload-based Worm Detection and Signature Generation
Pleiades - From Throw-away Traffic To Bots - Detecting The Rise Of DGA-based Malware
Pleiades - From Throw-away Traffic To Bots - Detecting The Rise Of DGA-based Malware
Polonium - Tera-Scale Graph Mining for Malware Detection
Practical Comprehensive Bounds on Surreptitious Communication Over DNS - slides
Practical Comprehensive Bounds on Surreptitious Communication Over DNS
Privacy-preserving Payload-based Correlation for Accurate Malicious Traffic Detection
Revealing Botnet Membership Using DNSBL Counter-Intelligence
Revolver - An Automated Approach to the Detection of Evasive Web-based Malware
Self-organized Collaboration of Distributed IDS Sensors
SinkMiner- Mining Botnet Sinkholes for Fun and Profit
Spamming Botnets - Signatures and Characteristics
Spectrogram - A Mixture of Markov Chain models for Anomaly Detection in Web Traffic
The Security of Machine Learning
Toward Stealthy Malware Detection
Traffic Aggregation for Malware Detection
Understanding the Domain Registration Behavior of Spammers
Understanding the Network-Level Behavior of Spammers
VAST- Network Visibility Across Space and Time
恶意软件
A static, packer-agnostic filter to detect similar malware samples
A study of malcode-bearing documents
A survey on automated dynamic malware-analysis techniques and tools
APT1 Technical backstage (malware.lu hack backs of APT1 servers)
Automatic Analysis of Malware Behavior using Machine Learning
BitShred - Fast, Scalable Code Reuse Detection in Binary Code
BitShred - Fast, Scalable Malware Triage
Deobfuscating Embedded Malware using Probable-Plaintext Attacks
Escape from Monkey Island - Evading High-Interaction Honeyclients
Eureka - A framework for enabling static malware analysis
Extraction of Statistically Significant Malware Behaviors
Fast Automated Unpacking and Classification of Malware
FIRMA - Malware Clustering and Network Signature Generation with Mixed Network Behaviors
FuncTracker - Discovering Shared Code (to aid malware forensics) - slides
FuncTracker - Discovering Shared Code to Aid Malware Forensics Extended Abstract
Malware files clustering based on file geometry and visualization using R language
Mobile Malware Detection Based on Energy Fingerprints — A Dead End
Polonium - Tera-Scale Graph Mining for Malware Detection
Putting out a HIT - Crowdsourcing Malware Installs
Scalable Fine-grained Behavioral Clustering of HTTP-based Malware
Selecting Features to Classify Malware
by Karthik Raman
SigMal - A Static Signal Processing Based Malware Triage
Tracking Memory Writes for Malware Classification and Code Reuse Identification
Using File Relationships in Malware Classification
VAMO - Towards a Fully Automated Malware Clustering Validity Analysis
数据收集
Crawling BitTorrent DHTs for Fun and Profit
CyberProbe - Towards Internet-Scale Active Detection of Malicious Servers
Demystifying service discovery - Implementing an internet-wide scanner
gitDigger - Creating useful wordlists from GitHub
PoisonAmplifier - A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks
ZMap - Fast Internet-Wide Scanning and its Security Applications (slides)
ZMap - Fast Internet-Wide Scanning and its Security Applications
漏洞分析/逆向
A Preliminary Analysis of Vulnerability Scores for Attacks in Wild
Attacker Economics for Internet-scale Vulnerability Risk Assessment
Detecting Logic Vulnerabilities in E-Commerce Applications
ReDeBug - Finding Unpatched Code Clones in Entire OS Distributions
The Classification of Valuable Data in an Assumption of Breach Paradigm
Toward Black-Box Detection of Logic Flaws in Web Applications
Vulnerability Extrapolation - Assisted Discovery of Vulnerabilities using Machine Learning - slides
Vulnerability Extrapolation - Assisted Discovery of Vulnerabilities using Machine Learning
匿名/隐私/审查
Anonymous Hacking Group – #OpNewblood Super Secret Security Handbook
Detecting Traffic Snooping in Tor Using Decoys
Risks and Realization of HTTPS Traffic Analysis
Selling Off Privacy at Auction
The Sniper Attack - Anonymously Deanonymizing and Disabling the Tor Network
The Velocity of Censorship - High-Fidelity Detection of Microblog Post Deletions - slides
The Velocity of Censorship - High-Fidelity Detection of Microblog Post Deletions
Tor vs. NSA
数据挖掘
An Exploration of Geolocation and Traffic Visualization Using Network Flows to Aid in Cyber Defense
DSpin - Detecting Automatically Spun Content on the Web
Gyrus - A Framework for User-Intent Monitoring of Text-Based Networked Applications
Indexing Million of Packets per Second using GPUs
Multi-Label Learning with Millions of Labels - Recommending Advertiser Bid Phrases for Web Pages
Real-Time Handling of Network Monitoring Data Using a Data-Intensive Framework
Shingled Graph Disassembly - Finding the Undecideable Path
Synoptic Graphlet - Bridging the Gap between Supervised and Unsupervised Profiling of Host-level Network Traffic
APT与网络犯罪
Connected Colors - Unveiling the Structure of Criminal Networks
Image Matching for Branding Phishing Kit Images - slides
Image Matching for Branding Phishing Kit Images
Inside a Targeted Point-of-Sale Data Breach
Investigating Advanced Persistent Threat 1 (APT1)
Measuring pay-per-install - the Commoditization of Malware Distribution
Scambaiter - Understanding Targeted Nigerian Scams on Craigslist
Sherlock Holmes and the Case of the Advanced Persistent Threat
The Role of the Underground Market in Twitter Spam and Abuse
The Tangled Web of Password Reuse
Trafficking Fraudulent Accounts - The Role of the Underground Market in Twitter Spam and Abuse
CND/CNA/CNE/CNO
Amplification Hell - Revisiting Network Protocols for DDoS Abuse
Defending The Enterprise, the Russian Way
Protecting a Moving Target - Addressing Web Application Concept Drift
Timing of Cyber Conflict
深度学习与网络安全
A Deep Learning Approach for Network Intrusion Detection System
A Hybrid Malicious Code Detection Method based on Deep Learning
A Hybrid Spectral Clustering and Deep Neural Network Ensemble Algorithm for Intrusion Detection in Sensor Networks
A Multi-task Learning Model for Malware Classification with Useful File Access Pattern from API Call Sequence
A Novel LSTM-RNN Decoding Algorithm in CAPTCHA Recognition
(Short paper)
An Analysis of Recurrent Neural Networks for Botnet Detection Behavior
Application of Recurrent Neural Networks for User Verification based on Keystroke Dynamics
Applications of Deep Learning On Traffic Identification
(video:
here
)
Combining Restricted Boltzmann Machine and One Side Perceptron for Malware Detection
Comparison Deep Learning Method to Traditional Methods Using for Network Intrusion Detection
(short paper)
Convolutional Neural Networks for Malware Classification
(THESIS)
Deep Learning Approach for Network Intrusion Detection in Software Defined Networking
Deep Learning for Classification of Malware System Call Sequences
Deep Learning for Zero-day Flash Malware Detection
(Short Paper)
Deep Learning is a Good Steganalysis Tool When Embedding Key is Reused for Different Images, even if there is a cover source mismatch
Deep Learning-based Feature Selection for Intrusion Detection System in Transport Layer
(Short Paper)
Deep Neural Network Based Malware Detection using Two Dimensional Binary Program Features
DeepDGA: Adversarially-Tuned Domain Generation and Detection
DeepSign: Deep Learning for Automatic Malware Signature Generation and Classification
DL4MD: A Deep Learning Framework for Intelligent Malware Detection
Droid-Sec: Deep Learning in Android Malware Detection
DroidDetector: Android Malware Characterization and Detection using Deep Learning
HADM: Hybrid Analysis for Detection of Malware
Identifying Top Sellers In Underground Economy Using Deep Learning-based Sentiment Analysis
Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security
Large-scale Malware Classification using Random Projections and Neural Networks
Learning a Static Analyzer: A Case Study on a Toy Language
Learning Spam Features using Restricted Boltzmann Machines
Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection
LSTM-based System-call Language Modeling and Robust Ensemble Method for Designing Host-based Intrusion Detection Systems
Malware Classification on Time Series Data Through Machine Learning
(THESIS)
Malware Classification with Recurrent Networks
Malware Detection with Deep Neural Network using Process Behavior
MS-LSTM: a Multi-Scale LSTM Model for BGP Anomaly Detection
MtNet: A Multi-Task Neural Network for Dynamic Malware Classification
Network Anomaly Detection with the Restricted Boltzmann Machine
Predicting Domain Generation Algorithms with Long Short-Term Memory Networks
Recognizing Functions in Binaries with Neural Networks
The Limitations of Deep Learning in Adversarial Settings
Toward large-scale vulnerability discovery using Machine Learning
顺便放着这里做个备份,以后慢慢读~
深度学习在信息安全的应用有哪些可以关注的人或论文? 的其他答案 点击这里
1
相关话题
机器学习能否用于综合评价?具体怎么操作?
如何评价生成模型框架 ZhuSuan?
网上流传的所谓「支付宝偷偷添加根证书,将造成安全隐患」的说法是否正确?
如何看待FAIR提出的8-bit optimizer:效果和32-bit optimizer相当?
人工智能就业前景越来越严峻了,你还在坚持吗?
为什么softmax很少会出现[0.5,0.5]?
服务器保存用户密码的方式都有哪些?
怎样让机器有意识?
外界对于黑客都存在哪些误解?
软件测试和网络安全哪个好就业?
前一个讨论
机器学习算法工程师如何自己接项目单干、并赚取比上班多得多的收入?
下一个讨论
对于稻城亚丁,你还会去第二次吗?
相关的话题
如果百年后深度学习最终有了公认的数学理论作为基础,能解释实验中的各类玄学,那这个理论会长什么样子?
神经网络中的能量函数是如何定义的?
hook是钓子的意思,它和钓鱼网站有关系吗?
如何评价AlphaGo Zero?
为什么图形学的会议siggraph的论文代码很少会开源?好像视觉如CVPR、ICCV开源的更多一些。
新手如何入门pytorch?
深度学习火热兴起后,隐马尔可夫模型(HMM)还有何独到之处,是不是几乎可被深度学习模型给替代了?
深度学习在信息安全的应用有哪些可以关注的人或论文?
能否使用神经网络来判断奇偶数?
如何评价 On Unifying Deep Generative Models 这篇 paper?
请问DeepMind和OpenAI身后的两大RL流派有什么具体的区别?
什么是迁移学习 (Transfer Learning)?这个领域历史发展前景如何?
adversarial training为什么会起作用?
如何反驳“代码混淆只是降低了可读性,安全性并没有得到实质提升”的观点?
如何看待旷视科技新产品监视学生上课?
美国银行卡进行网上购物,只需要卡号CVV和过期时间,但这些信息全都印在卡上,这样安全吗?
为什么有的论文放出训练好的模型和测试脚本,但不开源训练代码?
2019年CVPR有哪些糟糕的论文?
如何看待FAIR提出的8-bit optimizer:效果和32-bit optimizer相当?
CNN网络的pooling层有什么用?
如何评价何恺明、Ross Girshick组的自监督时空表征学习新作?
在有关部门的要求下,知乎官方会依法取匿吗?
普通FPGA工程师怎样向人工智能靠拢?
计算机视觉和自然语言处理,哪个更具有发展前景呢,还是各有千秋呢?
大家用resnet50在imagenet上面top1最高能到多少?
基于深度卷积神经网络进行人脸识别的原理是什么?
计算商品embedding然后平均得到用户embedding,会不会存在这种问题?
人工智能可以解决人类难题吗?
信息安全前沿技术有哪些?
联邦学习在机器学习领域有什么独立存在的价值?
服务条款
联系我们
关于我们
隐私政策
© 2024-11-22 - tinynew.org. All Rights Reserved.
© 2024-11-22 - tinynew.org. 保留所有权利