Author:
Nadeem Azqa,Verwer Sicco,Yang Shanchieh Jay
Publisher
Springer International Publishing
Reference64 articles.
1. Afianian, A., Niksefat, S., Sadeghiyan, B., & Baptiste, D. (2020). Malware dynamic analysis evasion techniques. ACM Computing Surveys, 52, 1–28.
2. Alata, E., Dacier, M., Deswarte, Y., et al. (2006). Collection and analysis of attack data based on honeypots deployed on the internet. In Quality of protection (pp. 79–91). Springer.
3. Alsaheel, A., Nan, Y., Ma, S., et al. (2021). ATLAS: A sequence-based learning approach for attack investigation. In 30th USENIX security symposium (USENIX security 21) (pp. 3005–3022).
4. Apruzzese, G., Andreolini, M., Marchetti, M., et al. (2020). Deep reinforcement adversarial learning against botnet evasion attacks. IEEE Transactions on Network and Service Management, 17, 1975–1987. https://doi.org/10.1109/TNSM.2020.3031843
5. Axelsson, S. (2000). The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information and System Security, 3, 186–205. https://doi.org/10.1145/357830.357849
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. SoK: Explainable Machine Learning for Computer Security Applications;2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P);2023-07