首页
查找话题
首页
深度学习在信息安全的应用有哪些可以关注的人或论文?
深度学习在信息安全的应用有哪些可以关注的人或论文? 第1页
1
zhu-wang-xiao-miao-o 网友的相关建议:
机器学习与网络安全
入侵检测
A Close Look on n-Grams in Intrusion Detection- Anomaly Detection vs. Classification
A Framework for the Application of Association Rule Mining in Large Intrusion Detection Infrastructures
A Kill Chain Analysis of the 2013 Target Data Breach
A Lone Wolf No More - Supporting Network Intrusion Detection with Real-Time Intelligence
A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks
Acquiring Digital Evidence from Botnet Attacks: Procedures and Methods (PhD Thesis)
ALERT-ID - Analyze Logs of the network Element in Real Time for Intrusion Detection
Anagram - A Content Anomaly Detector Resistant to Mimicry Attack
Anagram - A Content Anomaly Detector Resistant to Mimicry Attack
Anomaly-based Intrusion Detection in Software as a Service
Application of the PageRank Algorithm to Alarm Graphs
Back to Basics - Beyond Network Hygiene
Beehive - Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks
Behavioral Clustering of HTTP-based Malware and Signature Generation Using Malicious Network Traces
Beheading Hydras - Performing Effective Botnet Takedowns
Bloodhound - Searching Out Malicious Input in Network Flows for Automatic Repair Validation
Boosting the Scalability of Botnet Detection Using Adaptive Traffic Sampling
CAMP - Content Agnostic Malware Protection
CAMP - Content Agnostic Malware Protection
Casting out demons - Sanitizing training data for anomaly sensors
CloudFence - Data Flow Tracking as a Cloud Service
Comparing anomaly detection techniques for HTTP
Cujo - Efficient detection and prevention of drive-by-download attacks
Decoy Document Deployment for Effective Masquerade Attack Detection
Detecting Spammers with SNARE - Spatio-temporal Network-level Automatic Reputation Engine
Detecting Unknown Network Attacks Using Language Models
Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis
Effective Anomaly Detection with Scarce Training Data
Efficient Multidimensional Aggregation for Large Scale Monitoring
EFFORT - Efficient and Effective Bot Malware Detection
ExecScent- Mining for New C and C Domains in Live Networks with Adaptive Control Protocol Templates - slides
ExecScent- Mining for New C and C Domains in Live Networks with Adaptive Control Protocol Templates
EXPOSURE - Finding Malicious Domains Using Passive DNS Analysis
EXPOSURE - Finding Malicious Domains Using Passive DNS Analysis
FiG - Automatic Fingerprint Generation
Filtering Spam with Behavioral Blacklisting
Finding The Needle - Suppression of False Alarms in Large Intrusion Detection Data Sets
FLIPS - Hybrid Adaptive Intrusion Prevention
Heuristics for Improved Enterprise Intrusion Detection
by Jim Treinen
HMMPayl - An Intrusion Detection System Based on Hidden Markov Models
Kopis - Detecting malware domains at the upper dns hierarchy
Kopis - Detecting malware domains at the upper dns hierarchy
Large-Scale Malware Analysis, Detection, and Signature Generation
Leveraging Honest Users - Stealth Command-and-Control of Botnets - slides
Leveraging Honest Users - Stealth Command-and-Control of Botnets
Local System Security via SSHD Instrumentation
Machine Learning In Adversarial Environments
Malware vs. Big Data (Umbrella Labs)
McPAD - A Multiple Classifier System for Accurate Payload-based Anomaly Detection
Measuring and Detecting Malware Downloads in Live Network Traffic
Mining Botnet Sink Holes - slides
MISHIMA - Multilateration of Internet hosts hidden using malicious fast-flux agents
Monitoring the Initial DNS Behavior of Malicious Domains
N-Gram against the Machine - On the Feasibility of the N-Gram Network Analysis for Binary Protocols
Nazca - Detecting Malware Distribution in Large-Scale Networks
Nazca - Detecting Malware Distribution in Large-Scale Networks
Netgator - Malware Detection Using Program Interactive Challenges - slides
Network Traffic Characterization Using (p, n)-grams Packet Representation
Notos - Building a Dynamic Reputation System for DNS
Notos - Building a Dynamic Reputation System for DNS
On the Feasibility of Online Malware Detection with Performance Counters
On the Infeasibility of Modeling Polymorphic Shellcode
On the Mismanagement and Maliciousness of Networks
Outside the Closed World - On Using Machine Learning For Network Intrusion Detection
PAYL - Anomalous Payload-based Network Intrusion Detection
PAYL - Anomalous Payload-based Network Intrusion Detection
PAYL2 - Anomalous Payload-based Worm Detection and Signature Generation
Pleiades - From Throw-away Traffic To Bots - Detecting The Rise Of DGA-based Malware
Pleiades - From Throw-away Traffic To Bots - Detecting The Rise Of DGA-based Malware
Polonium - Tera-Scale Graph Mining for Malware Detection
Practical Comprehensive Bounds on Surreptitious Communication Over DNS - slides
Practical Comprehensive Bounds on Surreptitious Communication Over DNS
Privacy-preserving Payload-based Correlation for Accurate Malicious Traffic Detection
Revealing Botnet Membership Using DNSBL Counter-Intelligence
Revolver - An Automated Approach to the Detection of Evasive Web-based Malware
Self-organized Collaboration of Distributed IDS Sensors
SinkMiner- Mining Botnet Sinkholes for Fun and Profit
Spamming Botnets - Signatures and Characteristics
Spectrogram - A Mixture of Markov Chain models for Anomaly Detection in Web Traffic
The Security of Machine Learning
Toward Stealthy Malware Detection
Traffic Aggregation for Malware Detection
Understanding the Domain Registration Behavior of Spammers
Understanding the Network-Level Behavior of Spammers
VAST- Network Visibility Across Space and Time
恶意软件
A static, packer-agnostic filter to detect similar malware samples
A study of malcode-bearing documents
A survey on automated dynamic malware-analysis techniques and tools
APT1 Technical backstage (malware.lu hack backs of APT1 servers)
Automatic Analysis of Malware Behavior using Machine Learning
BitShred - Fast, Scalable Code Reuse Detection in Binary Code
BitShred - Fast, Scalable Malware Triage
Deobfuscating Embedded Malware using Probable-Plaintext Attacks
Escape from Monkey Island - Evading High-Interaction Honeyclients
Eureka - A framework for enabling static malware analysis
Extraction of Statistically Significant Malware Behaviors
Fast Automated Unpacking and Classification of Malware
FIRMA - Malware Clustering and Network Signature Generation with Mixed Network Behaviors
FuncTracker - Discovering Shared Code (to aid malware forensics) - slides
FuncTracker - Discovering Shared Code to Aid Malware Forensics Extended Abstract
Malware files clustering based on file geometry and visualization using R language
Mobile Malware Detection Based on Energy Fingerprints — A Dead End
Polonium - Tera-Scale Graph Mining for Malware Detection
Putting out a HIT - Crowdsourcing Malware Installs
Scalable Fine-grained Behavioral Clustering of HTTP-based Malware
Selecting Features to Classify Malware
by Karthik Raman
SigMal - A Static Signal Processing Based Malware Triage
Tracking Memory Writes for Malware Classification and Code Reuse Identification
Using File Relationships in Malware Classification
VAMO - Towards a Fully Automated Malware Clustering Validity Analysis
数据收集
Crawling BitTorrent DHTs for Fun and Profit
CyberProbe - Towards Internet-Scale Active Detection of Malicious Servers
Demystifying service discovery - Implementing an internet-wide scanner
gitDigger - Creating useful wordlists from GitHub
PoisonAmplifier - A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks
ZMap - Fast Internet-Wide Scanning and its Security Applications (slides)
ZMap - Fast Internet-Wide Scanning and its Security Applications
漏洞分析/逆向
A Preliminary Analysis of Vulnerability Scores for Attacks in Wild
Attacker Economics for Internet-scale Vulnerability Risk Assessment
Detecting Logic Vulnerabilities in E-Commerce Applications
ReDeBug - Finding Unpatched Code Clones in Entire OS Distributions
The Classification of Valuable Data in an Assumption of Breach Paradigm
Toward Black-Box Detection of Logic Flaws in Web Applications
Vulnerability Extrapolation - Assisted Discovery of Vulnerabilities using Machine Learning - slides
Vulnerability Extrapolation - Assisted Discovery of Vulnerabilities using Machine Learning
匿名/隐私/审查
Anonymous Hacking Group – #OpNewblood Super Secret Security Handbook
Detecting Traffic Snooping in Tor Using Decoys
Risks and Realization of HTTPS Traffic Analysis
Selling Off Privacy at Auction
The Sniper Attack - Anonymously Deanonymizing and Disabling the Tor Network
The Velocity of Censorship - High-Fidelity Detection of Microblog Post Deletions - slides
The Velocity of Censorship - High-Fidelity Detection of Microblog Post Deletions
Tor vs. NSA
数据挖掘
An Exploration of Geolocation and Traffic Visualization Using Network Flows to Aid in Cyber Defense
DSpin - Detecting Automatically Spun Content on the Web
Gyrus - A Framework for User-Intent Monitoring of Text-Based Networked Applications
Indexing Million of Packets per Second using GPUs
Multi-Label Learning with Millions of Labels - Recommending Advertiser Bid Phrases for Web Pages
Real-Time Handling of Network Monitoring Data Using a Data-Intensive Framework
Shingled Graph Disassembly - Finding the Undecideable Path
Synoptic Graphlet - Bridging the Gap between Supervised and Unsupervised Profiling of Host-level Network Traffic
APT与网络犯罪
Connected Colors - Unveiling the Structure of Criminal Networks
Image Matching for Branding Phishing Kit Images - slides
Image Matching for Branding Phishing Kit Images
Inside a Targeted Point-of-Sale Data Breach
Investigating Advanced Persistent Threat 1 (APT1)
Measuring pay-per-install - the Commoditization of Malware Distribution
Scambaiter - Understanding Targeted Nigerian Scams on Craigslist
Sherlock Holmes and the Case of the Advanced Persistent Threat
The Role of the Underground Market in Twitter Spam and Abuse
The Tangled Web of Password Reuse
Trafficking Fraudulent Accounts - The Role of the Underground Market in Twitter Spam and Abuse
CND/CNA/CNE/CNO
Amplification Hell - Revisiting Network Protocols for DDoS Abuse
Defending The Enterprise, the Russian Way
Protecting a Moving Target - Addressing Web Application Concept Drift
Timing of Cyber Conflict
深度学习与网络安全
A Deep Learning Approach for Network Intrusion Detection System
A Hybrid Malicious Code Detection Method based on Deep Learning
A Hybrid Spectral Clustering and Deep Neural Network Ensemble Algorithm for Intrusion Detection in Sensor Networks
A Multi-task Learning Model for Malware Classification with Useful File Access Pattern from API Call Sequence
A Novel LSTM-RNN Decoding Algorithm in CAPTCHA Recognition
(Short paper)
An Analysis of Recurrent Neural Networks for Botnet Detection Behavior
Application of Recurrent Neural Networks for User Verification based on Keystroke Dynamics
Applications of Deep Learning On Traffic Identification
(video:
here
)
Combining Restricted Boltzmann Machine and One Side Perceptron for Malware Detection
Comparison Deep Learning Method to Traditional Methods Using for Network Intrusion Detection
(short paper)
Convolutional Neural Networks for Malware Classification
(THESIS)
Deep Learning Approach for Network Intrusion Detection in Software Defined Networking
Deep Learning for Classification of Malware System Call Sequences
Deep Learning for Zero-day Flash Malware Detection
(Short Paper)
Deep Learning is a Good Steganalysis Tool When Embedding Key is Reused for Different Images, even if there is a cover source mismatch
Deep Learning-based Feature Selection for Intrusion Detection System in Transport Layer
(Short Paper)
Deep Neural Network Based Malware Detection using Two Dimensional Binary Program Features
DeepDGA: Adversarially-Tuned Domain Generation and Detection
DeepSign: Deep Learning for Automatic Malware Signature Generation and Classification
DL4MD: A Deep Learning Framework for Intelligent Malware Detection
Droid-Sec: Deep Learning in Android Malware Detection
DroidDetector: Android Malware Characterization and Detection using Deep Learning
HADM: Hybrid Analysis for Detection of Malware
Identifying Top Sellers In Underground Economy Using Deep Learning-based Sentiment Analysis
Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security
Large-scale Malware Classification using Random Projections and Neural Networks
Learning a Static Analyzer: A Case Study on a Toy Language
Learning Spam Features using Restricted Boltzmann Machines
Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection
LSTM-based System-call Language Modeling and Robust Ensemble Method for Designing Host-based Intrusion Detection Systems
Malware Classification on Time Series Data Through Machine Learning
(THESIS)
Malware Classification with Recurrent Networks
Malware Detection with Deep Neural Network using Process Behavior
MS-LSTM: a Multi-Scale LSTM Model for BGP Anomaly Detection
MtNet: A Multi-Task Neural Network for Dynamic Malware Classification
Network Anomaly Detection with the Restricted Boltzmann Machine
Predicting Domain Generation Algorithms with Long Short-Term Memory Networks
Recognizing Functions in Binaries with Neural Networks
The Limitations of Deep Learning in Adversarial Settings
Toward large-scale vulnerability discovery using Machine Learning
顺便放着这里做个备份,以后慢慢读~
深度学习在信息安全的应用有哪些可以关注的人或论文? 的其他答案 点击这里
1
相关话题
如何评价各种关联因素分析算法,尤其是在算法效果对比方面?
人工智能相关的岗位薪酬状况如何?
MD5是32位的,也就是说理论上是有限的,而世界上的数据是无限的,那会不会生成重复的MD5值?
物理专业的学生如何看待机器学习和大数据这些方向呢?
有没有根据一张人物的立绘正面像,自动生成同风格各侧面角度像并自动衍生表情的软件啊?
为什么 Bert 的三个 Embedding 可以进行相加?
计算机视觉顶级会议论文中比较适合初学计算机视觉的人做的复现实验有哪些?
AI在网络安全领域(尤其是威胁检测领域),有什么好的应用场景?
为什么在SGD中使用L1正则化很难获得稀疏性?
有哪些被骇客攻击的趣事?
前一个讨论
机器学习算法工程师如何自己接项目单干、并赚取比上班多得多的收入?
下一个讨论
对于稻城亚丁,你还会去第二次吗?
相关的话题
如何评价旷视开源的YOLOX,效果超过YOLOv5?
注意力机制是如何学习到模型所应注意的区域的?
作为渗透测试工程师有什么有趣的经历?
如何评价支付宝官方对于此次用户账户被他人实名认证事件的解释?
如何看待360杀毒在AV-C等评测机构的测试中因作弊被谴责后发布的公关文?
用工具的人能称得上的黑客吗?
《网络安全审查办法》规定掌握超百万用户个人信息运营者赴国外上市必须先申报网络安全审查,透露了哪些信息?
如何理解 Graph Convolutional Network(GCN)?
视觉Transformer如何优雅地避开位置编码?
如何看待兼修网络安全和人工智能?
为什么softmax很少会出现[0.5,0.5]?
支付宝在用户不知情的情况下给用户名加上“宝宝”二字,是否构成侵权?
RSA的公钥和私钥到底哪个才是用来加密和哪个用来解密?
如何看待360杀毒在AV-C等评测机构的测试中因作弊被谴责后发布的公关文?
工信部回应美撤销中国联通 214 牌照,称「坚决反对,将采取必要措施」,释放了哪些信号?
基于深度卷积神经网络进行人脸识别的原理是什么?
Windows安全策略里面有一个「登录之前需要按下CTRL+ALT+DEL」,这个策略有什么意义?
2019 秋招的 AI 岗位竞争激烈吗?
普通民众应该如何防范 GSM 劫持和短信嗅探所带来的安全隐患?
想学web渗透,没有语言基础,没有网络基础,怎么才能入门?
人工智能可以为人类找寻他们心目中的另一半吗?
如何看待网信办下架「滴滴出行」?将带来哪些影响?
如何看待支付宝「实名认证」时,如果选择了人脸验证则无法取消?
如何看待半年巨亏 13 亿的万豪因泄露客户数据获罚 1.6 亿? 酒店为何频中招?
如何制作高质量的(破译用)字典?
Google 的神经网络生成图像 (Inceptionism) 是怎么做到的?
如何看待Geoffrey Hinton的言论,深度学习要另起炉灶,彻底抛弃反向传播?
启明星辰是家什么公司?
如何看待印度APT黑客组织攻击我国医疗机构?
如何评价 DeepMind 公布的可生成算法竞赛解题代码的 AlphaCode?
服务条款
联系我们
关于我们
隐私政策
© 2025-04-05 - tinynew.org. All Rights Reserved.
© 2025-04-05 - tinynew.org. 保留所有权利