- Home
- Publications
- Publication Search
- Publication Details
Title
Review: machine learning techniques applied to cybersecurity
Authors
Keywords
Cybersecurity, Detection systems, Internet threats, Machine learning, Security
Journal
International Journal of Machine Learning and Cybernetics
Volume -, Issue -, Pages -
Publisher
Springer Nature
Online
2019-01-04
DOI
10.1007/s13042-018-00906-1
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing
- (2018) Abebe Abeshu et al. IEEE COMMUNICATIONS MAGAZINE
- Discovering the Relationship Between Generalization and Uncertainty by Incorporating Complexity of Classification
- (2018) Xi-Zhao Wang et al. IEEE Transactions on Cybernetics
- A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks
- (2018) Lorenzo Fernandez Maimo et al. IEEE Access
- Machine Learning and Deep Learning Methods for Cybersecurity
- (2018) Yang Xin et al. IEEE Access
- Incorporating Diversity and Informativeness in Multiple-Instance Active Learning
- (2017) Ran Wang et al. IEEE TRANSACTIONS ON FUZZY SYSTEMS
- Fuzziness based semi-supervised learning approach for intrusion detection system
- (2017) Rana Aamir Raza Ashfaq et al. INFORMATION SCIENCES
- Using virtual environments for the assessment of cybersecurity issues in IoT scenarios
- (2017) Angelo Furfaro et al. SIMULATION MODELLING PRACTICE AND THEORY
- A Study on Relationship Between Generalization Abilities and Fuzziness of Base Classifiers in Ensemble Learning
- (2015) Xi-Zhao Wang et al. IEEE TRANSACTIONS ON FUZZY SYSTEMS
- A Novel Approach for Bots Detection in Sina Microblog
- (2015) Wu Yang et al. Journal of Computational and Theoretical Nanoscience
- Malware behavioural detection and vaccine development by using a support vector model classifier
- (2015) Ping Wang et al. JOURNAL OF COMPUTER AND SYSTEM SCIENCES
- Deep learning
- (2015) Yann LeCun et al. NATURE
- Android based malware detection using a multifeature collaborative decision fusion approach
- (2015) Shina Sheen et al. NEUROCOMPUTING
- Stable web spam detection using features based on lexical items
- (2014) Marcin Luckner et al. COMPUTERS & SECURITY
- Characterization and classification of malicious Web traffic
- (2014) Katerina Goseva-Popstojanova et al. COMPUTERS & SECURITY
- Empirical assessment of machine learning-based malware detectors for Android
- (2014) Kevin Allix et al. EMPIRICAL SOFTWARE ENGINEERING
- Novel active learning methods for enhanced PC malware detection in windows OS
- (2014) Nir Nissim et al. EXPERT SYSTEMS WITH APPLICATIONS
- Generating Summary Risk Scores for Mobile Applications
- (2014) Christopher S. Gates et al. IEEE Transactions on Dependable and Secure Computing
- Big Data Analytics framework for Peer-to-Peer Botnet detection using Random Forests
- (2014) Kamaldeep Singh et al. INFORMATION SCIENCES
- Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques
- (2014) Michael Spreitzenbarth et al. International Journal of Information Security
- Hybrid P2P traffic classification with heuristic rules and machine learning
- (2014) Wujian Ye et al. SOFT COMPUTING
- Classification of Phishing Email Using Random Forest Machine Learning Technique
- (2014) Andronicus A. Akinyelu et al. Journal of Applied Mathematics
- Cyber security threats in the power sector: Need for a domain specific regulatory framework in India
- (2013) V. Ananda Kumar et al. ENERGY POLICY
- A Survey of Phishing Email Filtering Techniques
- (2013) Ammar Almomani et al. IEEE Communications Surveys and Tutorials
- Malware detection: program run length against detection rate
- (2013) Philip Okane et al. IET Software
- SAAD, a content based Web Spam Analyzer and Detector
- (2013) Víctor M. Prieto et al. JOURNAL OF SYSTEMS AND SOFTWARE
- Solving graph data issues using a layered architecture approach with applications to web spam detection
- (2013) Franco Scarselli et al. NEURAL NETWORKS
- Detecting malicious tweets in trending topics using a statistical analysis of language
- (2012) Juan Martinez-Romo et al. EXPERT SYSTEMS WITH APPLICATIONS
- A multi-tier phishing detection and filtering approach
- (2012) Rafiqul Islam et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Detecting unknown computer worm activity via support vector machines and active learning
- (2012) Nir Nissim et al. PATTERN ANALYSIS AND APPLICATIONS
- CANTINA+
- (2011) Guang Xiang et al. ACM Transactions on Information and System Security
- A survey of image spamming and filtering techniques
- (2011) Abdolrahman Attar et al. ARTIFICIAL INTELLIGENCE REVIEW
- Feature representation and selection in malicious code detection methods based on static system calls
- (2011) Ding Yuxin et al. COMPUTERS & SECURITY
- Malware target recognition via static heuristics
- (2011) T. Dube et al. COMPUTERS & SECURITY
- An efficient phishing webpage detector
- (2011) Mingxing He et al. EXPERT SYSTEMS WITH APPLICATIONS
- Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems
- (2011) F. Benevenuto et al. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS
- A Novel Malware Clustering Method Using Frequency of Function Call Traces in Parallel Threads
- (2011) Junji NAKAZATO et al. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS
- “Andromaly”: a behavioral malware detection framework for android devices
- (2011) Asaf Shabtai et al. JOURNAL OF INTELLIGENT INFORMATION SYSTEMS
- ELF-Miner: using structural knowledge and data mining methods to detect new (Linux) malicious executables
- (2011) Farrukh Shahzad et al. KNOWLEDGE AND INFORMATION SYSTEMS
- A survey and experimental evaluation of image spam filtering techniques
- (2011) Battista Biggio et al. PATTERN RECOGNITION LETTERS
- A study of spam filtering using support vector machines
- (2010) Ola Amayri et al. ARTIFICIAL INTELLIGENCE REVIEW
- Clustering botnet communication traffic based on n-gram feature selection
- (2010) Wei Lu et al. COMPUTER COMMUNICATIONS
- Proliferation and Detection of Blog Spam
- (2010) Saeed Abu-Nimeh et al. IEEE SECURITY & PRIVACY
- Detecting spam blogs from blog search results
- (2010) Linhong Zhu et al. INFORMATION PROCESSING & MANAGEMENT
- A review of machine learning approaches to Spam filtering
- (2009) Thiago S. Guzella et al. EXPERT SYSTEMS WITH APPLICATIONS
- Better Naive Bayes classification for high-precision spam detection
- (2009) Yang Song et al. SOFTWARE-PRACTICE & EXPERIENCE
- Cybersecurity: Stakeholder incentives, externalities, and policy options
- (2009) Johannes M. Bauer et al. TELECOMMUNICATIONS POLICY
- MapReduce
- (2008) Jeffrey Dean et al. COMMUNICATIONS OF THE ACM
- Improving malware detection by applying multi-inducer ensemble
- (2008) Eitan Menahem et al. COMPUTATIONAL STATISTICS & DATA ANALYSIS
- Behavior-based spam detection using a hybrid method of rule-based techniques and neural networks
- (2008) Chih-Hung Wu EXPERT SYSTEMS WITH APPLICATIONS
Add your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload NowCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now