首页
查找话题
首页
深度学习在信息安全的应用有哪些可以关注的人或论文?
深度学习在信息安全的应用有哪些可以关注的人或论文? 第1页
1
zhu-wang-xiao-miao-o 网友的相关建议:
机器学习与网络安全
入侵检测
A Close Look on n-Grams in Intrusion Detection- Anomaly Detection vs. Classification
A Framework for the Application of Association Rule Mining in Large Intrusion Detection Infrastructures
A Kill Chain Analysis of the 2013 Target Data Breach
A Lone Wolf No More - Supporting Network Intrusion Detection with Real-Time Intelligence
A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks
Acquiring Digital Evidence from Botnet Attacks: Procedures and Methods (PhD Thesis)
ALERT-ID - Analyze Logs of the network Element in Real Time for Intrusion Detection
Anagram - A Content Anomaly Detector Resistant to Mimicry Attack
Anagram - A Content Anomaly Detector Resistant to Mimicry Attack
Anomaly-based Intrusion Detection in Software as a Service
Application of the PageRank Algorithm to Alarm Graphs
Back to Basics - Beyond Network Hygiene
Beehive - Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks
Behavioral Clustering of HTTP-based Malware and Signature Generation Using Malicious Network Traces
Beheading Hydras - Performing Effective Botnet Takedowns
Bloodhound - Searching Out Malicious Input in Network Flows for Automatic Repair Validation
Boosting the Scalability of Botnet Detection Using Adaptive Traffic Sampling
CAMP - Content Agnostic Malware Protection
CAMP - Content Agnostic Malware Protection
Casting out demons - Sanitizing training data for anomaly sensors
CloudFence - Data Flow Tracking as a Cloud Service
Comparing anomaly detection techniques for HTTP
Cujo - Efficient detection and prevention of drive-by-download attacks
Decoy Document Deployment for Effective Masquerade Attack Detection
Detecting Spammers with SNARE - Spatio-temporal Network-level Automatic Reputation Engine
Detecting Unknown Network Attacks Using Language Models
Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis
Effective Anomaly Detection with Scarce Training Data
Efficient Multidimensional Aggregation for Large Scale Monitoring
EFFORT - Efficient and Effective Bot Malware Detection
ExecScent- Mining for New C and C Domains in Live Networks with Adaptive Control Protocol Templates - slides
ExecScent- Mining for New C and C Domains in Live Networks with Adaptive Control Protocol Templates
EXPOSURE - Finding Malicious Domains Using Passive DNS Analysis
EXPOSURE - Finding Malicious Domains Using Passive DNS Analysis
FiG - Automatic Fingerprint Generation
Filtering Spam with Behavioral Blacklisting
Finding The Needle - Suppression of False Alarms in Large Intrusion Detection Data Sets
FLIPS - Hybrid Adaptive Intrusion Prevention
Heuristics for Improved Enterprise Intrusion Detection
by Jim Treinen
HMMPayl - An Intrusion Detection System Based on Hidden Markov Models
Kopis - Detecting malware domains at the upper dns hierarchy
Kopis - Detecting malware domains at the upper dns hierarchy
Large-Scale Malware Analysis, Detection, and Signature Generation
Leveraging Honest Users - Stealth Command-and-Control of Botnets - slides
Leveraging Honest Users - Stealth Command-and-Control of Botnets
Local System Security via SSHD Instrumentation
Machine Learning In Adversarial Environments
Malware vs. Big Data (Umbrella Labs)
McPAD - A Multiple Classifier System for Accurate Payload-based Anomaly Detection
Measuring and Detecting Malware Downloads in Live Network Traffic
Mining Botnet Sink Holes - slides
MISHIMA - Multilateration of Internet hosts hidden using malicious fast-flux agents
Monitoring the Initial DNS Behavior of Malicious Domains
N-Gram against the Machine - On the Feasibility of the N-Gram Network Analysis for Binary Protocols
Nazca - Detecting Malware Distribution in Large-Scale Networks
Nazca - Detecting Malware Distribution in Large-Scale Networks
Netgator - Malware Detection Using Program Interactive Challenges - slides
Network Traffic Characterization Using (p, n)-grams Packet Representation
Notos - Building a Dynamic Reputation System for DNS
Notos - Building a Dynamic Reputation System for DNS
On the Feasibility of Online Malware Detection with Performance Counters
On the Infeasibility of Modeling Polymorphic Shellcode
On the Mismanagement and Maliciousness of Networks
Outside the Closed World - On Using Machine Learning For Network Intrusion Detection
PAYL - Anomalous Payload-based Network Intrusion Detection
PAYL - Anomalous Payload-based Network Intrusion Detection
PAYL2 - Anomalous Payload-based Worm Detection and Signature Generation
Pleiades - From Throw-away Traffic To Bots - Detecting The Rise Of DGA-based Malware
Pleiades - From Throw-away Traffic To Bots - Detecting The Rise Of DGA-based Malware
Polonium - Tera-Scale Graph Mining for Malware Detection
Practical Comprehensive Bounds on Surreptitious Communication Over DNS - slides
Practical Comprehensive Bounds on Surreptitious Communication Over DNS
Privacy-preserving Payload-based Correlation for Accurate Malicious Traffic Detection
Revealing Botnet Membership Using DNSBL Counter-Intelligence
Revolver - An Automated Approach to the Detection of Evasive Web-based Malware
Self-organized Collaboration of Distributed IDS Sensors
SinkMiner- Mining Botnet Sinkholes for Fun and Profit
Spamming Botnets - Signatures and Characteristics
Spectrogram - A Mixture of Markov Chain models for Anomaly Detection in Web Traffic
The Security of Machine Learning
Toward Stealthy Malware Detection
Traffic Aggregation for Malware Detection
Understanding the Domain Registration Behavior of Spammers
Understanding the Network-Level Behavior of Spammers
VAST- Network Visibility Across Space and Time
恶意软件
A static, packer-agnostic filter to detect similar malware samples
A study of malcode-bearing documents
A survey on automated dynamic malware-analysis techniques and tools
APT1 Technical backstage (malware.lu hack backs of APT1 servers)
Automatic Analysis of Malware Behavior using Machine Learning
BitShred - Fast, Scalable Code Reuse Detection in Binary Code
BitShred - Fast, Scalable Malware Triage
Deobfuscating Embedded Malware using Probable-Plaintext Attacks
Escape from Monkey Island - Evading High-Interaction Honeyclients
Eureka - A framework for enabling static malware analysis
Extraction of Statistically Significant Malware Behaviors
Fast Automated Unpacking and Classification of Malware
FIRMA - Malware Clustering and Network Signature Generation with Mixed Network Behaviors
FuncTracker - Discovering Shared Code (to aid malware forensics) - slides
FuncTracker - Discovering Shared Code to Aid Malware Forensics Extended Abstract
Malware files clustering based on file geometry and visualization using R language
Mobile Malware Detection Based on Energy Fingerprints — A Dead End
Polonium - Tera-Scale Graph Mining for Malware Detection
Putting out a HIT - Crowdsourcing Malware Installs
Scalable Fine-grained Behavioral Clustering of HTTP-based Malware
Selecting Features to Classify Malware
by Karthik Raman
SigMal - A Static Signal Processing Based Malware Triage
Tracking Memory Writes for Malware Classification and Code Reuse Identification
Using File Relationships in Malware Classification
VAMO - Towards a Fully Automated Malware Clustering Validity Analysis
数据收集
Crawling BitTorrent DHTs for Fun and Profit
CyberProbe - Towards Internet-Scale Active Detection of Malicious Servers
Demystifying service discovery - Implementing an internet-wide scanner
gitDigger - Creating useful wordlists from GitHub
PoisonAmplifier - A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks
ZMap - Fast Internet-Wide Scanning and its Security Applications (slides)
ZMap - Fast Internet-Wide Scanning and its Security Applications
漏洞分析/逆向
A Preliminary Analysis of Vulnerability Scores for Attacks in Wild
Attacker Economics for Internet-scale Vulnerability Risk Assessment
Detecting Logic Vulnerabilities in E-Commerce Applications
ReDeBug - Finding Unpatched Code Clones in Entire OS Distributions
The Classification of Valuable Data in an Assumption of Breach Paradigm
Toward Black-Box Detection of Logic Flaws in Web Applications
Vulnerability Extrapolation - Assisted Discovery of Vulnerabilities using Machine Learning - slides
Vulnerability Extrapolation - Assisted Discovery of Vulnerabilities using Machine Learning
匿名/隐私/审查
Anonymous Hacking Group – #OpNewblood Super Secret Security Handbook
Detecting Traffic Snooping in Tor Using Decoys
Risks and Realization of HTTPS Traffic Analysis
Selling Off Privacy at Auction
The Sniper Attack - Anonymously Deanonymizing and Disabling the Tor Network
The Velocity of Censorship - High-Fidelity Detection of Microblog Post Deletions - slides
The Velocity of Censorship - High-Fidelity Detection of Microblog Post Deletions
Tor vs. NSA
数据挖掘
An Exploration of Geolocation and Traffic Visualization Using Network Flows to Aid in Cyber Defense
DSpin - Detecting Automatically Spun Content on the Web
Gyrus - A Framework for User-Intent Monitoring of Text-Based Networked Applications
Indexing Million of Packets per Second using GPUs
Multi-Label Learning with Millions of Labels - Recommending Advertiser Bid Phrases for Web Pages
Real-Time Handling of Network Monitoring Data Using a Data-Intensive Framework
Shingled Graph Disassembly - Finding the Undecideable Path
Synoptic Graphlet - Bridging the Gap between Supervised and Unsupervised Profiling of Host-level Network Traffic
APT与网络犯罪
Connected Colors - Unveiling the Structure of Criminal Networks
Image Matching for Branding Phishing Kit Images - slides
Image Matching for Branding Phishing Kit Images
Inside a Targeted Point-of-Sale Data Breach
Investigating Advanced Persistent Threat 1 (APT1)
Measuring pay-per-install - the Commoditization of Malware Distribution
Scambaiter - Understanding Targeted Nigerian Scams on Craigslist
Sherlock Holmes and the Case of the Advanced Persistent Threat
The Role of the Underground Market in Twitter Spam and Abuse
The Tangled Web of Password Reuse
Trafficking Fraudulent Accounts - The Role of the Underground Market in Twitter Spam and Abuse
CND/CNA/CNE/CNO
Amplification Hell - Revisiting Network Protocols for DDoS Abuse
Defending The Enterprise, the Russian Way
Protecting a Moving Target - Addressing Web Application Concept Drift
Timing of Cyber Conflict
深度学习与网络安全
A Deep Learning Approach for Network Intrusion Detection System
A Hybrid Malicious Code Detection Method based on Deep Learning
A Hybrid Spectral Clustering and Deep Neural Network Ensemble Algorithm for Intrusion Detection in Sensor Networks
A Multi-task Learning Model for Malware Classification with Useful File Access Pattern from API Call Sequence
A Novel LSTM-RNN Decoding Algorithm in CAPTCHA Recognition
(Short paper)
An Analysis of Recurrent Neural Networks for Botnet Detection Behavior
Application of Recurrent Neural Networks for User Verification based on Keystroke Dynamics
Applications of Deep Learning On Traffic Identification
(video:
here
)
Combining Restricted Boltzmann Machine and One Side Perceptron for Malware Detection
Comparison Deep Learning Method to Traditional Methods Using for Network Intrusion Detection
(short paper)
Convolutional Neural Networks for Malware Classification
(THESIS)
Deep Learning Approach for Network Intrusion Detection in Software Defined Networking
Deep Learning for Classification of Malware System Call Sequences
Deep Learning for Zero-day Flash Malware Detection
(Short Paper)
Deep Learning is a Good Steganalysis Tool When Embedding Key is Reused for Different Images, even if there is a cover source mismatch
Deep Learning-based Feature Selection for Intrusion Detection System in Transport Layer
(Short Paper)
Deep Neural Network Based Malware Detection using Two Dimensional Binary Program Features
DeepDGA: Adversarially-Tuned Domain Generation and Detection
DeepSign: Deep Learning for Automatic Malware Signature Generation and Classification
DL4MD: A Deep Learning Framework for Intelligent Malware Detection
Droid-Sec: Deep Learning in Android Malware Detection
DroidDetector: Android Malware Characterization and Detection using Deep Learning
HADM: Hybrid Analysis for Detection of Malware
Identifying Top Sellers In Underground Economy Using Deep Learning-based Sentiment Analysis
Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security
Large-scale Malware Classification using Random Projections and Neural Networks
Learning a Static Analyzer: A Case Study on a Toy Language
Learning Spam Features using Restricted Boltzmann Machines
Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection
LSTM-based System-call Language Modeling and Robust Ensemble Method for Designing Host-based Intrusion Detection Systems
Malware Classification on Time Series Data Through Machine Learning
(THESIS)
Malware Classification with Recurrent Networks
Malware Detection with Deep Neural Network using Process Behavior
MS-LSTM: a Multi-Scale LSTM Model for BGP Anomaly Detection
MtNet: A Multi-Task Neural Network for Dynamic Malware Classification
Network Anomaly Detection with the Restricted Boltzmann Machine
Predicting Domain Generation Algorithms with Long Short-Term Memory Networks
Recognizing Functions in Binaries with Neural Networks
The Limitations of Deep Learning in Adversarial Settings
Toward large-scale vulnerability discovery using Machine Learning
顺便放着这里做个备份,以后慢慢读~
深度学习在信息安全的应用有哪些可以关注的人或论文? 的其他答案 点击这里
1
相关话题
卷积神经网络如果将池化层去除,与神经网络的区别还大么?
如何看待「原谅宝」?
Windows安全策略里面有一个「登录之前需要按下CTRL+ALT+DEL」,这个策略有什么意义?
如何看待百度于2017年2月28日晚疑似停止服务?
如何评价AlphaGo Zero?
如何看待大量国产输入法被下架?
如何看待swin transformer成为ICCV2021的 best paper?
大学校方监控学生的上网记录妥当吗?是否侵犯学生隐私?学校通过什么技术手段监控,并且推送通报批评的消息?
如何评价 7 月 31 日一流科技开源的深度学习框架 OneFlow?
用生成模型做数据增强data augmentation时,如何从合成数据中筛选出质量较好的样本?
前一个讨论
机器学习算法工程师如何自己接项目单干、并赚取比上班多得多的收入?
下一个讨论
对于稻城亚丁,你还会去第二次吗?
相关的话题
如何用C语言和windows api实现一个基本的ssl协议?(参考资料已备齐)
深度学习attention机制中的Q,K,V分别是从哪来的?
如何看待 2017 年 5 月 12 日中国大量高校及公共设备发生电脑中毒,勒索比特币的事件?
威胁网络安全的因素有哪些?
Linux 有所谓「天生安全基因」吗,整体安全性设计是否更优秀?
如果黑客拥有一台算力无限的主机,他能做什么?
中国内地的iCloud服务转由云上贵州运营意味着什么?
西电为什么密码学排第一?
目前,人工智能语音在说中文时的语气感觉上还比较机械,怎样使人工智能语音的语气更自然一些?
如何知道是谁泄露了你的信息?
为什么Transformer要用LayerNorm?
互联网平台推出的「青少年模式」是否有效?还有哪些改进空间?
如果学习从零开始学习Pytorch,有优秀的开源项目可以推荐吗?
为什么我用相同的模型,数据,超参,随机种子,在两台服务器会得到不同的结果?
为什么下载的破解游戏经常会被报毒?
如何看待指出 神经网络的训练罪魁祸首是退化一文?
妈妈认为在朋友圈发照片很危险,该怎么反驳她?
如何评价百度帝吧管理被人肉搜索,个人资料泄露。我国个人信息泄露的问题和规模究竟有多大?
2021年深度学习哪些方向比较新颖,处于上升期或者朝阳阶段,没那么饱和,比较有研究潜力?
如何看待爱德华·斯诺登揭秘美国政府监听计划 PRISM 的行为?他的命运又将如何?
启明星辰是家什么公司?
如何看待「屏幕共享功能」被利用进行网络诈骗?还有哪些需要注意的互联网诈骗手段?
围棋AI为什么没有下出同局?
普通FPGA工程师怎样向人工智能靠拢?
使用强化学习解决实际问题时常常避不开环境模拟或者使用离线强化学习算法,两者分别有什么优缺点?
什么是哈希洪水攻击(Hash-Flooding Attack)?
为什么softmax很少会出现[0.5,0.5]?
如何反驳“代码混淆只是降低了可读性,安全性并没有得到实质提升”的观点?
如何评价Facebook AI提出的ResMLP,对比Google的MLP-Mixer?
网络安全真的那么好吗?
服务条款
联系我们
关于我们
隐私政策
© 2025-03-25 - tinynew.org. All Rights Reserved.
© 2025-03-25 - tinynew.org. 保留所有权利