相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。An improved model for detecting DGA botnets using random forest algorithm
Xuan Dau Hoang et al.
INFORMATION SECURITY JOURNAL (2022)
Explainable Artificial Intelligence: Objectives, Stakeholders, and Future Research Opportunities
Christian Meske et al.
INFORMATION SYSTEMS MANAGEMENT (2022)
A historical perspective of explainable Artificial Intelligence
Roberto Confalonieri et al.
WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY (2021)
A Comprehensive Survey on Transfer Learning
Fuzhen Zhuang et al.
PROCEEDINGS OF THE IEEE (2021)
Encrypted and covert DNS queries for botnets: Challenges and countermeasures
Constantinos Patsakis et al.
COMPUTERS & SECURITY (2020)
A review of privacy-preserving techniques for deep learning
Amine Boulemtafes et al.
NEUROCOMPUTING (2020)
Explainable Artificial Intelligence (XAI): Concepts, taxonomies, opportunities and challenges toward responsible AI
Alejandro Barredo Arrieta et al.
INFORMATION FUSION (2020)
Privacy-Preserving Deep Learning on Machine Learning as a Service-a Comprehensive Survey
Harry Chandra Tanuwidjaja et al.
IEEE ACCESS (2020)
MaskDGA: An Evasion Attack Against DGA Classifiers and Adversarial Defenses
Lior Sidi et al.
IEEE ACCESS (2020)
Under false flag: using technical artifacts for cyber attack attribution
Florian Skopik et al.
CYBERSECURITY (2020)
An analysis and classification of public information security data sources used in research and practice
Clemens Sauerwein et al.
COMPUTERS & SECURITY (2019)
Issues and challenges in DNS based botnet detection: A survey
Manmeet Singh et al.
COMPUTERS & SECURITY (2019)
Clustering Malicious DNS Queries for Blacklist-Based Detection
Akihiro Satoh et al.
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS (2019)
Cyber threat intelligence sharing: Survey and research directions
Thomas D. Wagner et al.
COMPUTERS & SECURITY (2019)
Malicious Domain Names Detection Algorithm Based on N-Gram
Hong Zhao et al.
JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS (2019)
Sharing Cyber Threat Intelligence Under the General Data Protection Regulation
Adham Albakri et al.
PRIVACY TECHNOLOGIES AND POLICY, APF 2019 (2019)
Addressing Adversarial Attacks Against Security Systems Based on Machine Learning
Giovanni Apruzzese et al.
2019 11TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON): SILENT BATTLE (2019)
CharBot: A Simple and Effective Method for Evading DGA Classifiers
Jonathan Peck et al.
IEEE ACCESS (2019)
A survey on technical threat intelligence in the age of sophisticated cyber attacks
Wiem Tounsi et al.
COMPUTERS & SECURITY (2018)
A Reliability Comparison Method for OSINT Validity Analysis
Seonghyeon Gong et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)
Wild patterns: Ten years after the rise of adversarial machine learning
Battista Biggio et al.
PATTERN RECOGNITION (2018)
A Novel Trust Taxonomy for Shared Cyber Threat Intelligence
Thomas D. Wagner et al.
SECURITY AND COMMUNICATION NETWORKS (2018)
Peeking Inside the Black-Box: A Survey on Explainable Artificial Intelligence (XAI)
Amina Adadi et al.
IEEE ACCESS (2018)
A Bibliometric Analysis of the Explainable Artificial Intelligence Research Field
Jose M. Alonso et al.
INFORMATION PROCESSING AND MANAGEMENT OF UNCERTAINTY IN KNOWLEDGE-BASED SYSTEMS: THEORY AND FOUNDATIONS, IPMU 2018, PT I (2018)
Explainable AI: The New 42?
Randy Goebel et al.
MACHINE LEARNING AND KNOWLEDGE EXTRACTION, CD-MAKE 2018 (2018)
A survey of botnet detection based on DNS
Kamal Alieyan et al.
NEURAL COMPUTING & APPLICATIONS (2017)
DBod: Clustering and detecting DGA-based botnets using DNS traffic analysis
Tzy-Shiah Wang et al.
COMPUTERS & SECURITY (2017)
A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing
Florian Skopik et al.
COMPUTERS & SECURITY (2016)
DeepDGA: Adversarially-Tuned Domain Generation and Detection
Hyrum S. Anderson et al.
AISEC'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY (2016)
On the ground truth problem of malicious DNS traffic analysis
Matija Stevanovic et al.
COMPUTERS & SECURITY (2015)
DFBotKiller: Domain-flux botnet detection based on the history of group activities and failures in DNS traffic
Reza Sharifnya et al.
DIGITAL INVESTIGATION (2015)
Detecting Algorithmically Generated Domain-Flux Attacks With DNS Traffic Analysis
Sandeep Yadav et al.
IEEE-ACM TRANSACTIONS ON NETWORKING (2012)
Explanation and trust: what to tell the user in security and AI?
Wolter Pieters
ETHICS AND INFORMATION TECHNOLOGY (2011)