参考文献
[1]Chandran S,Hrudya P,Poornachandran P.An Efficient Classification Model for Detecting Advanced Persistent Threat[C]//Proceedings of International Conference on Advances in Computing,Communications and Informatics.Washington
D.C.,USA:IEEE Press,2015:333-337.
[2]Bhatt P,Yano E T,Gustavsson P.Towards a Framework to Detect Multi-stage Advanced Persistent Threats Attacks[C]//Proceedings of the 8th International Sym-posium on Service Oriented System Engineering.Washington D.C.,USA:IEEE
Press,2014:390-395.
[3]Wu Dongjie,Mao Chinghao,Lee H M,et al.DroidMat:Android Malware Detection Through Manifest and API Calls Tracing[C]//Proceedings of the 7th Asia Joint Conference on Information Security.Washington D.C.,USA:IEEE Press,2012:62-69.
[4]Pehlivan U,Baltaci N,Acarturk C,et al.The Analysis of Feature Selection Methods and Classification Algorithms in Permission Based Android Malware Detection[C]//Proceedings of IEEE Symposium on Computational Intelligence in Cyber
Security.Washington D.C.,USA:IEEE Press,2014:1-8.
[5]Choudhury S,Bhowal A.Comparative Analysis of Machine Learning Algorithms Along with Classifiers for Network Intrusion Detection[C]//Proceedings of Inter-national Conference on Smart Technologies and Management for
Computing,Communication,Controls,Energy and Materials.Washington D.C.,USA:IEEE Press,2015:89-95.
[6]Alam M S,Vuong S T.Random Forest Classification for Detecting Android Malware[C]//Proceedings of International Conference on Green Computing and Communication.Washington D.C.,USA:IEEE Press,2013:663-669.
[7]Modupe A,Olugbara O O,Ojo S O.Exploring Support Vector Machines and Random Forests to Detect Advanced Fee Fraud Activities on Internet[C]//Proceedings of the 11th International Conference on Data Mining Workshops.Washington
D.C.,USA:IEEE Press,2011:331-335.
[8]Ham H S,Choi M J.Analysis of Android Malware Detection Performance Using Machine Learning Classifiers[C]//Proceedings of International Conference on ICT Convergence.Washington D.C.,USA:IEEE Press,2013:490-495.
[9]Quader F,Janeja V,Stauffer J.Persistent Threat Pattern Discovery[C]//Proceedings of IEEE International Conference on Intelligence and Security Informatics.Washington D.C.,USA:IEEE Press,2015.
[10]何毓锟,李强,嵇跃德,等.一种关联网络和主机行为的延迟僵尸检测方法[J].计算机学报,2014,37(1):50-61.
[11]Hong K F,Chen C C,Chiu Y T,et al.Ctracer:Uncover C&C in Advanced Persistent Threats Based on Scalable Framework for Enterprise Log Data[C]// Proceedings of IEEE International Congress on Big Data.Washington D.C.,USA:IEEE
Press,2015:551-558.
[12]Li F,Lai A,Ddl D.Evidence of Advanced Persistent Threat:A Case Study of Malware for Political Espionage[C]//Proceedings of the 6th International Conference on Malicious & Unwanted Software.Washington D.C.,USA:IEEE Press,2011:102
-109.
[13]Ramsey B W,Mullins B E,Temple M A,et al.Wireless Intrusion Detection and Device Fingerprinting Through Preamble Manipulation[J].IEEE Transactions on Dependable & Secure Computing,2015,12(5):585-596.
[14]Wolf T,Chandrikakutty H,Hu Kekai,et al.Securing Network Processors with High-performance Hardware Monitors[J].IEEE Transactions on Dependable & Secure Computing,2014,12(6):1.
[15]刘文怡,薛质,王轶骏.基于网络流统计数据的伪装入侵检测[J].计算机工程,2014,40(7):78-81.
编辑顾逸斐 |