共 26 条
[1]
[Anonymous], PROC THE 35TH IEEE S
[2]
[Anonymous], ALGORITHMIC LEARNING
[3]
[Anonymous], 2007, P HONEYNET PROJECT
[4]
[Anonymous], 2013, P 2013 ACM WORKSH AR
[5]
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[7]
Scaling and Effectiveness of Email Masquerade Attacks: Exploiting Natural Language Generation
[J].
PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17),
2017,
:469-482
[8]
Biggio B., 2014, Proceedings of the 2014 workshop on artificial intelligent and security workshop, P27
[9]
Conformal Clustering and Its Application to Botnet Traffic
[J].
STATISTICAL LEARNING AND DATA SCIENCES,
2015, 9047
:313-322
[10]
Chirita P.A., 2005, Proceedings of the 14th ACM international conference on Information and knowledge management, CIKM '05, P373