Related references
Note: Only part of the references are listed.N-BaIoT-Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders
Yair Meidan et al.
IEEE PERVASIVE COMPUTING (2018)
ALDOCX: Detection of Unknown Malicious Microsoft Office Documents Using Designated Active Learning Methods Based on New Structural Feature Extraction Methodology
Nir Nissim et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Ranked batch-mode active learning
Thiago N. C. Cardoso et al.
INFORMATION SCIENCES (2017)
A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
Anna L. Buczak et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)
Botnets: A survey
Sergio S. C. Silva et al.
COMPUTER NETWORKS (2013)
Toward Supervised Anomaly Detection
Nico Goernitz et al.
JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH (2013)
An active learning based TCM-KNN algorithm for supervised network intrusion detection
Yang Li et al.
COMPUTERS & SECURITY (2007)