首页
查找话题
首页
深度学习在信息安全的应用有哪些可以关注的人或论文?
深度学习在信息安全的应用有哪些可以关注的人或论文? 第1页
1
zhu-wang-xiao-miao-o 网友的相关建议:
机器学习与网络安全
入侵检测
A Close Look on n-Grams in Intrusion Detection- Anomaly Detection vs. Classification
A Framework for the Application of Association Rule Mining in Large Intrusion Detection Infrastructures
A Kill Chain Analysis of the 2013 Target Data Breach
A Lone Wolf No More - Supporting Network Intrusion Detection with Real-Time Intelligence
A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks
Acquiring Digital Evidence from Botnet Attacks: Procedures and Methods (PhD Thesis)
ALERT-ID - Analyze Logs of the network Element in Real Time for Intrusion Detection
Anagram - A Content Anomaly Detector Resistant to Mimicry Attack
Anagram - A Content Anomaly Detector Resistant to Mimicry Attack
Anomaly-based Intrusion Detection in Software as a Service
Application of the PageRank Algorithm to Alarm Graphs
Back to Basics - Beyond Network Hygiene
Beehive - Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks
Behavioral Clustering of HTTP-based Malware and Signature Generation Using Malicious Network Traces
Beheading Hydras - Performing Effective Botnet Takedowns
Bloodhound - Searching Out Malicious Input in Network Flows for Automatic Repair Validation
Boosting the Scalability of Botnet Detection Using Adaptive Traffic Sampling
CAMP - Content Agnostic Malware Protection
CAMP - Content Agnostic Malware Protection
Casting out demons - Sanitizing training data for anomaly sensors
CloudFence - Data Flow Tracking as a Cloud Service
Comparing anomaly detection techniques for HTTP
Cujo - Efficient detection and prevention of drive-by-download attacks
Decoy Document Deployment for Effective Masquerade Attack Detection
Detecting Spammers with SNARE - Spatio-temporal Network-level Automatic Reputation Engine
Detecting Unknown Network Attacks Using Language Models
Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis
Effective Anomaly Detection with Scarce Training Data
Efficient Multidimensional Aggregation for Large Scale Monitoring
EFFORT - Efficient and Effective Bot Malware Detection
ExecScent- Mining for New C and C Domains in Live Networks with Adaptive Control Protocol Templates - slides
ExecScent- Mining for New C and C Domains in Live Networks with Adaptive Control Protocol Templates
EXPOSURE - Finding Malicious Domains Using Passive DNS Analysis
EXPOSURE - Finding Malicious Domains Using Passive DNS Analysis
FiG - Automatic Fingerprint Generation
Filtering Spam with Behavioral Blacklisting
Finding The Needle - Suppression of False Alarms in Large Intrusion Detection Data Sets
FLIPS - Hybrid Adaptive Intrusion Prevention
Heuristics for Improved Enterprise Intrusion Detection
by Jim Treinen
HMMPayl - An Intrusion Detection System Based on Hidden Markov Models
Kopis - Detecting malware domains at the upper dns hierarchy
Kopis - Detecting malware domains at the upper dns hierarchy
Large-Scale Malware Analysis, Detection, and Signature Generation
Leveraging Honest Users - Stealth Command-and-Control of Botnets - slides
Leveraging Honest Users - Stealth Command-and-Control of Botnets
Local System Security via SSHD Instrumentation
Machine Learning In Adversarial Environments
Malware vs. Big Data (Umbrella Labs)
McPAD - A Multiple Classifier System for Accurate Payload-based Anomaly Detection
Measuring and Detecting Malware Downloads in Live Network Traffic
Mining Botnet Sink Holes - slides
MISHIMA - Multilateration of Internet hosts hidden using malicious fast-flux agents
Monitoring the Initial DNS Behavior of Malicious Domains
N-Gram against the Machine - On the Feasibility of the N-Gram Network Analysis for Binary Protocols
Nazca - Detecting Malware Distribution in Large-Scale Networks
Nazca - Detecting Malware Distribution in Large-Scale Networks
Netgator - Malware Detection Using Program Interactive Challenges - slides
Network Traffic Characterization Using (p, n)-grams Packet Representation
Notos - Building a Dynamic Reputation System for DNS
Notos - Building a Dynamic Reputation System for DNS
On the Feasibility of Online Malware Detection with Performance Counters
On the Infeasibility of Modeling Polymorphic Shellcode
On the Mismanagement and Maliciousness of Networks
Outside the Closed World - On Using Machine Learning For Network Intrusion Detection
PAYL - Anomalous Payload-based Network Intrusion Detection
PAYL - Anomalous Payload-based Network Intrusion Detection
PAYL2 - Anomalous Payload-based Worm Detection and Signature Generation
Pleiades - From Throw-away Traffic To Bots - Detecting The Rise Of DGA-based Malware
Pleiades - From Throw-away Traffic To Bots - Detecting The Rise Of DGA-based Malware
Polonium - Tera-Scale Graph Mining for Malware Detection
Practical Comprehensive Bounds on Surreptitious Communication Over DNS - slides
Practical Comprehensive Bounds on Surreptitious Communication Over DNS
Privacy-preserving Payload-based Correlation for Accurate Malicious Traffic Detection
Revealing Botnet Membership Using DNSBL Counter-Intelligence
Revolver - An Automated Approach to the Detection of Evasive Web-based Malware
Self-organized Collaboration of Distributed IDS Sensors
SinkMiner- Mining Botnet Sinkholes for Fun and Profit
Spamming Botnets - Signatures and Characteristics
Spectrogram - A Mixture of Markov Chain models for Anomaly Detection in Web Traffic
The Security of Machine Learning
Toward Stealthy Malware Detection
Traffic Aggregation for Malware Detection
Understanding the Domain Registration Behavior of Spammers
Understanding the Network-Level Behavior of Spammers
VAST- Network Visibility Across Space and Time
恶意软件
A static, packer-agnostic filter to detect similar malware samples
A study of malcode-bearing documents
A survey on automated dynamic malware-analysis techniques and tools
APT1 Technical backstage (malware.lu hack backs of APT1 servers)
Automatic Analysis of Malware Behavior using Machine Learning
BitShred - Fast, Scalable Code Reuse Detection in Binary Code
BitShred - Fast, Scalable Malware Triage
Deobfuscating Embedded Malware using Probable-Plaintext Attacks
Escape from Monkey Island - Evading High-Interaction Honeyclients
Eureka - A framework for enabling static malware analysis
Extraction of Statistically Significant Malware Behaviors
Fast Automated Unpacking and Classification of Malware
FIRMA - Malware Clustering and Network Signature Generation with Mixed Network Behaviors
FuncTracker - Discovering Shared Code (to aid malware forensics) - slides
FuncTracker - Discovering Shared Code to Aid Malware Forensics Extended Abstract
Malware files clustering based on file geometry and visualization using R language
Mobile Malware Detection Based on Energy Fingerprints — A Dead End
Polonium - Tera-Scale Graph Mining for Malware Detection
Putting out a HIT - Crowdsourcing Malware Installs
Scalable Fine-grained Behavioral Clustering of HTTP-based Malware
Selecting Features to Classify Malware
by Karthik Raman
SigMal - A Static Signal Processing Based Malware Triage
Tracking Memory Writes for Malware Classification and Code Reuse Identification
Using File Relationships in Malware Classification
VAMO - Towards a Fully Automated Malware Clustering Validity Analysis
数据收集
Crawling BitTorrent DHTs for Fun and Profit
CyberProbe - Towards Internet-Scale Active Detection of Malicious Servers
Demystifying service discovery - Implementing an internet-wide scanner
gitDigger - Creating useful wordlists from GitHub
PoisonAmplifier - A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks
ZMap - Fast Internet-Wide Scanning and its Security Applications (slides)
ZMap - Fast Internet-Wide Scanning and its Security Applications
漏洞分析/逆向
A Preliminary Analysis of Vulnerability Scores for Attacks in Wild
Attacker Economics for Internet-scale Vulnerability Risk Assessment
Detecting Logic Vulnerabilities in E-Commerce Applications
ReDeBug - Finding Unpatched Code Clones in Entire OS Distributions
The Classification of Valuable Data in an Assumption of Breach Paradigm
Toward Black-Box Detection of Logic Flaws in Web Applications
Vulnerability Extrapolation - Assisted Discovery of Vulnerabilities using Machine Learning - slides
Vulnerability Extrapolation - Assisted Discovery of Vulnerabilities using Machine Learning
匿名/隐私/审查
Anonymous Hacking Group – #OpNewblood Super Secret Security Handbook
Detecting Traffic Snooping in Tor Using Decoys
Risks and Realization of HTTPS Traffic Analysis
Selling Off Privacy at Auction
The Sniper Attack - Anonymously Deanonymizing and Disabling the Tor Network
The Velocity of Censorship - High-Fidelity Detection of Microblog Post Deletions - slides
The Velocity of Censorship - High-Fidelity Detection of Microblog Post Deletions
Tor vs. NSA
数据挖掘
An Exploration of Geolocation and Traffic Visualization Using Network Flows to Aid in Cyber Defense
DSpin - Detecting Automatically Spun Content on the Web
Gyrus - A Framework for User-Intent Monitoring of Text-Based Networked Applications
Indexing Million of Packets per Second using GPUs
Multi-Label Learning with Millions of Labels - Recommending Advertiser Bid Phrases for Web Pages
Real-Time Handling of Network Monitoring Data Using a Data-Intensive Framework
Shingled Graph Disassembly - Finding the Undecideable Path
Synoptic Graphlet - Bridging the Gap between Supervised and Unsupervised Profiling of Host-level Network Traffic
APT与网络犯罪
Connected Colors - Unveiling the Structure of Criminal Networks
Image Matching for Branding Phishing Kit Images - slides
Image Matching for Branding Phishing Kit Images
Inside a Targeted Point-of-Sale Data Breach
Investigating Advanced Persistent Threat 1 (APT1)
Measuring pay-per-install - the Commoditization of Malware Distribution
Scambaiter - Understanding Targeted Nigerian Scams on Craigslist
Sherlock Holmes and the Case of the Advanced Persistent Threat
The Role of the Underground Market in Twitter Spam and Abuse
The Tangled Web of Password Reuse
Trafficking Fraudulent Accounts - The Role of the Underground Market in Twitter Spam and Abuse
CND/CNA/CNE/CNO
Amplification Hell - Revisiting Network Protocols for DDoS Abuse
Defending The Enterprise, the Russian Way
Protecting a Moving Target - Addressing Web Application Concept Drift
Timing of Cyber Conflict
深度学习与网络安全
A Deep Learning Approach for Network Intrusion Detection System
A Hybrid Malicious Code Detection Method based on Deep Learning
A Hybrid Spectral Clustering and Deep Neural Network Ensemble Algorithm for Intrusion Detection in Sensor Networks
A Multi-task Learning Model for Malware Classification with Useful File Access Pattern from API Call Sequence
A Novel LSTM-RNN Decoding Algorithm in CAPTCHA Recognition
(Short paper)
An Analysis of Recurrent Neural Networks for Botnet Detection Behavior
Application of Recurrent Neural Networks for User Verification based on Keystroke Dynamics
Applications of Deep Learning On Traffic Identification
(video:
here
)
Combining Restricted Boltzmann Machine and One Side Perceptron for Malware Detection
Comparison Deep Learning Method to Traditional Methods Using for Network Intrusion Detection
(short paper)
Convolutional Neural Networks for Malware Classification
(THESIS)
Deep Learning Approach for Network Intrusion Detection in Software Defined Networking
Deep Learning for Classification of Malware System Call Sequences
Deep Learning for Zero-day Flash Malware Detection
(Short Paper)
Deep Learning is a Good Steganalysis Tool When Embedding Key is Reused for Different Images, even if there is a cover source mismatch
Deep Learning-based Feature Selection for Intrusion Detection System in Transport Layer
(Short Paper)
Deep Neural Network Based Malware Detection using Two Dimensional Binary Program Features
DeepDGA: Adversarially-Tuned Domain Generation and Detection
DeepSign: Deep Learning for Automatic Malware Signature Generation and Classification
DL4MD: A Deep Learning Framework for Intelligent Malware Detection
Droid-Sec: Deep Learning in Android Malware Detection
DroidDetector: Android Malware Characterization and Detection using Deep Learning
HADM: Hybrid Analysis for Detection of Malware
Identifying Top Sellers In Underground Economy Using Deep Learning-based Sentiment Analysis
Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security
Large-scale Malware Classification using Random Projections and Neural Networks
Learning a Static Analyzer: A Case Study on a Toy Language
Learning Spam Features using Restricted Boltzmann Machines
Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection
LSTM-based System-call Language Modeling and Robust Ensemble Method for Designing Host-based Intrusion Detection Systems
Malware Classification on Time Series Data Through Machine Learning
(THESIS)
Malware Classification with Recurrent Networks
Malware Detection with Deep Neural Network using Process Behavior
MS-LSTM: a Multi-Scale LSTM Model for BGP Anomaly Detection
MtNet: A Multi-Task Neural Network for Dynamic Malware Classification
Network Anomaly Detection with the Restricted Boltzmann Machine
Predicting Domain Generation Algorithms with Long Short-Term Memory Networks
Recognizing Functions in Binaries with Neural Networks
The Limitations of Deep Learning in Adversarial Settings
Toward large-scale vulnerability discovery using Machine Learning
顺便放着这里做个备份,以后慢慢读~
深度学习在信息安全的应用有哪些可以关注的人或论文? 的其他答案 点击这里
1
相关话题
如何系统地自学网络安全?
如何看待KDD'21的文章,异质图神经网络的效果不如简单的GCN、GAT?
深度学习attention机制中的Q,K,V分别是从哪来的?
除了深度学习,机器学习领域近年来还有什么热点吗?
北京深鉴科技基于FPGA平台的DPU架构如何?
自己学习深度学习时,有哪些途径寻找数据集?
如何通过事件查看开放公网远程桌面的电脑有没有被访问?
如何理解链接预测(link prediction)?
为什么即使世界最知名的软件程序,也无法阻止被人破解的命运?
什么时候对数据进行[0,1]归一化,什么时候[-1,1]归一化,二者分别在什么场景?
前一个讨论
机器学习算法工程师如何自己接项目单干、并赚取比上班多得多的收入?
下一个讨论
对于稻城亚丁,你还会去第二次吗?
相关的话题
如何看待swin transformer成为ICCV2021的 best paper?
如何看待 2017 年 5 月 12 日中国大量高校及公共设备发生电脑中毒,勒索比特币的事件?
数据库预编译为何能防止SQL注入?
网络安全书籍推荐?
机器学习在Web攻击方向有什么建树吗?
LSTM如何来避免梯度弥散和梯度爆炸?
为什么现在有这么多人工智能无用论?
「杀毒软件之父」75 岁约翰·迈克菲死于西班牙监狱中,他做出了哪些贡献,如何评价他的一生?
你有哪些deep learning(rnn、cnn)调参的经验?
如何看待MXNet获得amazon官方支持首位?
学生网络用知识蒸馏损失去逼近教师网络,如何提高学生网络的准确率?
如何看待「原谅宝」?
无人车为什么一定要用激光雷达做,双目视觉难道不行吗?
能否对卷积神经网络工作原理做一个直观的解释?
如何看待目前国内「隐私计算」行业现状,市场发展有哪些趋势?
黑客为什么不攻击卫星?
工信部回应美撤销中国联通 214 牌照,称「坚决反对,将采取必要措施」,释放了哪些信号?
为什么更安全的 HTTPS 协议没有在互联网上全面采用?
想学网络安全,有没有良心机构推荐?
马上计算机研一,想问一下机器学习、深度学习…大家都是怎么入门的?
普通FPGA工程师怎样向人工智能靠拢?
各种浏览器的隐私/无痕模式能否真的能够解决隐私问题?
为什么我用相同的模型,数据,超参,随机种子,在两台服务器会得到不同的结果?
外界对于黑客都存在哪些误解?
如何看待谷歌研究人员提出的卷积正则化方法「DropBlock」?
算法源于大数据,而大数据源于我们每一个人,那我们是不是应该拥有主导数据的权利?
计算机视觉中,目前有哪些经典的目标跟踪算法?
如何成为安全架构师?
国内网络安全行业人才何时饱和,这个行业还有几年的热度?
如何将某个分布作为机器学习的特征?
服务条款
联系我们
关于我们
隐私政策
© 2025-03-06 - tinynew.org. All Rights Reserved.
© 2025-03-06 - tinynew.org. 保留所有权利