참고문헌
- Y. Shen, E. Mariconti, P. Vervier, and G.Stringhini, "Tiresias: Predicting Security Events Through Deep Learning," Proceedings of ACM CCS'18
- Z. Cui, F. Xue, Y. Cao, and G. Wanf, "Detection of Malicious Code Variants Based on Deep Learning", IEEE Trans. on Industrial Informatics, Vol.14, No.7, 2018
- M. Du, F. Li, G. Zheng, V. Srikumar, "DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning," Proceedings of ACM CCS'17
- Z. Li, D. Zou, S. Xu, X. Ou, H. Jin, S. Wang, Z. Deng, and Y. Zhong, "VulDeePecker: A Deep Learning-Based System for Vulnerability Detection," NDSS'18
- E. Raff, J. Barker, J. Sylvester, R. Brandon, B. Catanzaro, and C. Nicholas, "Malwrae Detection by Eating a whole EXE," AAAI Workshop on Artificial Intelligence for Cyber Security, 2018
- R. Ronen, M. Radu, C. Feuerstein, E. Yom-Tov, and M. Ahmadi, "Microsoft Malware Classification Challenge," https://arxiv.org/abs/1802.10135
- Microsoft Malware Prediction, 2019, https://www.kaggle.com/c/microsoft-malware-prediction
- http://datachallenge.kr/
- http://ocslab.hksecurity.net/Datasets
- M. Tavallaee, E. Bagheri, W. Lu, and A. Ghorbani, "A Detailed Analysis of the KDD CUP 99 Data Set," Proceedings of the IEEE CSIDA'09
- Canadian Institute for Cybersecurity, https://www.unb.ca/cic/datasets/index.html
- 2011-2013 VAST Cyber Challenge: Computer Network Operations at All Freight Corporation, http://www.vacommunity.org/2011+-+2013+VAST+Cyber+Challenges
- E. Rezende, G. Ruppert, T. Carvalho, F. Ramos and P. Geus, "Malicious Software Classification Using Transfer Learning of ResNet-50 Deep Neural Network," in Proceedings of the IEEE ICMLA'17
- X. Ugarte-pedrero, M. Graziano, and D. Balzarotti, "A Close Look at a Daily Dataset of Malware Samples," ACM Transactions on Privacy and Security, Vol. 22, Jan., 2019
- Kaspersky, "Machine Learning for Malware Detection," 2017
- S. Khatuya, N. Ganguly, J. Basak, M. Bharde, and B. Mitra, "ADELE: Anomaly Detection from Event Log Empiricism," Proceedings of IEEE INFOCOM'18
- Microsoft Malware Winners' Interview, http://blog.kaggle.com/2015/05/26/microsoft-malware-winners-interview-1st-place-no-to-overfitting/
- KDD Cup 1999: Computer network intrusion detection, https://www.kdd.org/kdd-cup/view/kdd-cup-1999/Data