4.6 Review

Machine learning in cybersecurity: A review

Related references

Note: Only part of the references are listed.
Article Engineering, Electrical & Electronic

Distributed Privacy-Preserving Collaborative Intrusion Detection Systems for VANETs

Tao Zhang et al.

IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS (2018)

Article Computer Science, Information Systems

Cyber security of critical infrastructures

Leandros A. Maglaras et al.

ICT EXPRESS (2018)

Article Engineering, Electrical & Electronic

The 2015 Ukraine Blackout: Implications for False Data Injection Attacks

Gaoqi Liang et al.

IEEE TRANSACTIONS ON POWER SYSTEMS (2017)

Article Computer Science, Artificial Intelligence

A survey of deep neural network architectures and their applications

Weibo Liu et al.

NEUROCOMPUTING (2017)

Article Computer Science, Information Systems

An Effective Approach for Classification of Advanced Malware with High Accuracy

Ashu Sharma et al.

INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS (2016)

Proceedings Paper Computer Science, Interdisciplinary Applications

Malware Detection with Deep Neural Network Using Process Behavior

Shun Tobiyama et al.

PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC), VOL 2 (2016)

Article Computer Science, Theory & Methods

A Survey of Intrusion Detection Techniques for Cyber-Physical Systems

Robert Mitchell et al.

ACM COMPUTING SURVEYS (2014)

Article Computer Science, Artificial Intelligence

Security Evaluation of Pattern Classifiers under Attack

Battista Biggio et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2014)

Article Computer Science, Information Systems

Opcode sequences as representation of executables for data-mining-based unknown malware detection

Igor Santos et al.

INFORMATION SCIENCES (2013)

Proceedings Paper Computer Science, Cybernetics

Anomaly Detection via One Class SVM for Protection of SCADA Systems

Jianmin Jiang et al.

2013 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC) (2013)

Article Construction & Building Technology

A SCADA system for energy management in intelligent buildings

Joao Figueiredo et al.

ENERGY AND BUILDINGS (2012)

Article Engineering, Electrical & Electronic

Methodology for a Security/Dependability Adaptive Protection Scheme Based on Data Mining

Emanuel E. Bernabeu et al.

IEEE TRANSACTIONS ON POWER DELIVERY (2012)

Article Computer Science, Artificial Intelligence

Andromaly: a behavioral malware detection framework for android devices

Asaf Shabtai et al.

JOURNAL OF INTELLIGENT INFORMATION SYSTEMS (2012)

Article Computer Science, Information Systems

Automatic analysis of malware behavior using machine learning

Konrad Rieck et al.

JOURNAL OF COMPUTER SECURITY (2011)

Article International Relations

Stuxnet and the Future of Cyber War

James P. Farwell et al.

SURVIVAL (2011)

Article Engineering, Electrical & Electronic

Microgrid Protection Using Communication-Assisted Digital Relays

Eric Sortomme et al.

IEEE TRANSACTIONS ON POWER DELIVERY (2010)

Article Computer Science, Artificial Intelligence

The security of machine learning

Marco Barreno et al.

MACHINE LEARNING (2010)

Review Computer Science, Information Systems

Content-based multimedia information retrieval: State of the art and challenges

Michael S. Lew et al.

ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS (2006)

Article Computer Science, Artificial Intelligence

An efficient k-means clustering algorithm:: Analysis and implementation

T Kanungo et al.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2002)