Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Viewing all articles
Browse latest Browse all 12749

The Definitive Security Data Science and Machine Learning Guide

0
0

This is the Definitive Security Data Science and Machine Learning Guide. It includes books, tutorials, presentations, blog posts, and research papers about solving security problems using data science.

Table of Contents Machine Learning and Security Papers Deep Learning and Security Papers Deep Learning and Security Presentations Security Data Science Blogs Security Data Science Blogposts / Tutorials Security Data Science Projects Security Data Science Books Security Data Science Presentations / Talks Machine Learning and Security Papers Intrusion Detection Papers A Close Look on n-Grams in Intrusion Detection- Anomaly Detection vs. Classication A Framework for the Application of Association Rule Mining in Large Intrusion Detection Infrastructures A Kill Chain Analysis of the 2013 Target Data Breach A Lone Wolf No More - Supporting Network Intrusion Detection with Real-Time Intelligence A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks Acquiring Digital Evidence from Botnet Attacks: Procedures and Methods (PhD Thesis) ALERT-ID - Analyze Logs of the network Element in Real Time for Intrusion Detection Anagram - A Content Anomaly Detector Resistant to Mimicry Attack Anagram - A Content Anomaly Detector Resistant to Mimicry Attack Anomaly-based Intrusion Detection in Software as a Service Application of the PageRank Algorithm to Alarm Graphs Back to Basics - Beyond Network Hygiene Beehive - Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks Behavioral Clustering of HTTP-based Malware and Signature Generation Using Malicious Network Traces Beheading Hydras - Performing Effective Botnet Takedowns Bloodhound - Searching Out Malicious Input in Network Flows for Automatic Repair Validation Boosting the Scalability of Botnet Detection Using Adaptive Traffic Sampling CAMP - Content Agnostic Malware Protection CAMP - Content Agnostic Malware Protection Casting out demons - Sanitizing training data for anomaly sensors CloudFence - Data Flow Tracking as a Cloud Service Comparing anomaly detection techniques for HTTP Cujo - Efficient detection and prevention of drive-by-download attacks Decoy Document Deployment for Effective Masquerade Attack Detection Detecting Spammers with SNARE - Spatio-temporal Network-level Automatic Reputation Engine De

Viewing all articles
Browse latest Browse all 12749

Latest Images

Trending Articles



click here for Latest and Popular articles on Mesothelioma and Asbestos


Latest Images