Author:
Fei Jiahui,Sun Yunpeng,Wang Yuejin,Lian Zhichao
Publisher
Springer Nature Singapore
Reference23 articles.
1. Lunt, T.F.: A survey of intrusion detection techniques. Comput. Secur. 12(4), 405–418 (1993)
2. Shibahara, T., Yagi, T., Akiyama, M., et al.: Efficient dynamic malware analysis based on network behavior using deep learning. In: 2016 IEEE Global Communications Conference (GLOBECOM), pp. 1–7. IEEE (2016)
3. David, O.E., Netanyahu, N.S.: DeepSign: deep learning for automatic malware signature generation and classification. In: 2015 International Joint Conference on Neural Networks (IJCNN), pp. 1–8. IEEE (2015)
4. Pan, Y., Lin, J.: Malicious network stream generation and verification based on generative adversarial networks. J. East China Univ. Sci. Technol. 45(2), 165–171 (2019)
5. Pan, S.J., Yang, Q.: A survey on transfer learning. IEEE Trans. Knowl. Discov. Data Eng. 22(10), 1345–1359 (2010)