参考文献
[1]罗可,林睦纲,郗东妹.数据挖掘中分类算法综述[J].计算机工程,2005,31(1):3-5.
[2]王斌,潘文锋.基于内容的垃圾邮件过滤技术综述[J].中文信息学报,2005,19(5):1-10.
[3]蒋建春,马恒太,任党恩,等.网络安全入侵检测:研究综述[J].软件学报,2000,11(11):1460-1466.
[4]Jain A K,Nandakumar K,Nagar A.Biometric Template Security[J].EURASIP Journal on Advances in Signal Processing,2008(1):1-17.
[5]Perdisci R,Dagon D,Lee W,et al.Misleading Worm Sig-nature Generators Using Deliberate Noise Injection[C]//Proceedings of IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2006:15-31.
[6]Graham C J.How to Beat an Adaptive Spamfilter[EB/OL].(2014-06-17).https://www.researchgate.net/publication/243784554_How_to_beat_an_adaptive_spam_filter.
[7]Daniel L,Meek C.Good Word Attacks on Statistical Spam Filters[C]//Proceedings of the 2nd Conference on Email and Anti-Spam.Mountain View,USA:[s.n.],2005:21-25.
[8]Wittel G L,Wu S F.On Attacking Statistical Spam Filters[C]//Proceedings of the 1st Conference on Email and Anti-Spam.Mountain View,USA:[s.n.],2004:57-68.
[9]Denning D E.An Intrusion-detection Model[J].IEEE Transactions on Software Engineering,1987,SE-13(2):222-232.
[10]Kemmerer R A,Vigna G.Intrusion Detection:A Brief History and Overview[J].Computer,2002,35(4):27-30.
[11]Kruegel C,Vigna G.Anomaly Detection of Web-based Attacks[C]//Proceedings of the 10th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2003:251-261.
[12]Valeur F,Mutz D,Vigna G.A Learning-based Approach to the Detection of SQL Attacks[C]//Proceedings of International Conference on Detection of Intrusions & Malware.Berlin,Germany:Springer,2005:123-140.
[13]Dalvi N,Domingos P,Sanghai S,et al.Adversarial Classification[C]//Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.New York,USA:ACM Press,2004:99-108.
[14]Lowd D,Meek C.Adversarial Learning[C]//Pro-ceedings of the 11th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining.New York,USA:ACM Press,2005:641-647.
[15]Barreno M,Nelson B,Sears R,et al.Can Machine Learning Be Secure?[C]//Proceedings of 2006 ACM Symposium on Information,Computer and Communica-tions Security.New York,USA:ACM Press,2006:16-25.
编辑陆燕菲 |