共 18 条
[2]
Benjamin V, 2015, 2015 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), P85, DOI 10.1109/ISI.2015.7165944
[3]
Fraud Detection through Graph-Based User Behavior Modeling
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:1696-1697
[5]
Bullough BenjaminL., 2017, P 2017 ACM INT WORKS, DOI DOI 10.1145/3041008.3041009
[6]
Cao Q, 2012, 9 USENIX S NETW SYST, P197
[7]
Predicting Cyber Vulnerability Exploits with Machine Learning
[J].
THIRTEENTH SCANDINAVIAN CONFERENCE ON ARTIFICIAL INTELLIGENCE (SCAI 2015),
2015, 278
:48-57
[8]
Holt TJ, 2012, INT J CYBER CRIMINOL, V6, P891
[9]
Motoyama M., P 2011 ACM SIGCOMM C, P71, DOI DOI 10.1145/2068816.2068824
[10]
Nayak Kartik, 2014, Research in Attacks, Intrusions and Defenses, P426