Related references
Note: Only part of the references are listed.Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection
Ambra Demontis et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)
Learning Detector of Malicious Network Traffic from Weak Labels
Vojtech Franc et al.
MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES, PT III (2015)
Robust Representation for Domain Adaptation in Network Security
Karel Bartos et al.
MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES, PT III (2015)
Malware Detection Using Network Traffic Analysis in Android Based Mobile Devices
Anshul Arora et al.
2014 EIGHTH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPS, SERVICES AND TECHNOLOGIES (NGMAST) (2014)
Graph-based malware detection using dynamic analysis
Blake Anderson et al.
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2011)
Tunnel Hunter: Detecting application-layer tunnels with statistical fingerprinting
M. Dusi et al.
COMPUTER NETWORKS (2009)
A Survey of Techniques for Internet Traffic Classification using Machine Learning
Thuy T. T. Nguyen et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2008)
Traffic classification through simple statistical fingerprinting.
Manuel Crotti et al.
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2007)
Malware phylogeny generation using permutations of code
Md. Enamul Karim et al.
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2005)