4.7 Article

Joint detection of malicious domains and infected clients

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection

Ambra Demontis et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Proceedings Paper Computer Science, Artificial Intelligence

Learning Detector of Malicious Network Traffic from Weak Labels

Vojtech Franc et al.

MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES, PT III (2015)

Proceedings Paper Computer Science, Artificial Intelligence

Robust Representation for Domain Adaptation in Network Security

Karel Bartos et al.

MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES, PT III (2015)

Proceedings Paper Computer Science, Software Engineering

Malware Detection Using Network Traffic Analysis in Android Based Mobile Devices

Anshul Arora et al.

2014 EIGHTH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPS, SERVICES AND TECHNOLOGIES (NGMAST) (2014)

Article Computer Science, Information Systems

Graph-based malware detection using dynamic analysis

Blake Anderson et al.

JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2011)

Article Computer Science, Hardware & Architecture

Tunnel Hunter: Detecting application-layer tunnels with statistical fingerprinting

M. Dusi et al.

COMPUTER NETWORKS (2009)

Article Computer Science, Information Systems

A Survey of Techniques for Internet Traffic Classification using Machine Learning

Thuy T. T. Nguyen et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2008)

Article Computer Science, Information Systems

Traffic classification through simple statistical fingerprinting.

Manuel Crotti et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2007)

Article Computer Science, Information Systems

Malware phylogeny generation using permutations of code

Md. Enamul Karim et al.

JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2005)