1 |
Symantec Corporation. 2016. Internet security threat report.
|
2 |
OWASP Top Ten Project, 2017 [Internet]. Available: https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project.
|
3 |
J. Liang, W. Zhao, and W. Ye, "Anomaly-Based Web Attack Detection: A Deep Learning Approach," the VI International Conference on Network, Communication and Computing. ACM, pp. 80-85, 2017.
|
4 |
H. Mac, D. Truong, L. Nguyen, H. A. Tran, and D. Tran, "Detecting Attacks on Web Applications using Autoencoder," the 9th Internationa Symposium on Information and Communication Technology, Viet Nam, pp. 416-421, 2018.
|
5 |
T. Mikolov, I. Sutskever, K. Chen, G. Corrando, and J. Dean, "Distirubuted representations of words and phrases and their compositionality." Advances in neural information processing systems, pp. 3111-3119, 2013.
|
6 |
Q. Le, "Distributed Representations of Sentences and Documents," International conference on machine learning, vol. 32, pp. 1188-1196, Jun. 2014.
|
7 |
F. T. Liu, K. M. Ting, and Z. Hua, "Isolation Forest," the 8th IEEE International Conference on Data Mining, pp. 413-422, 2008.
|
8 |
Gensim, Last updated on July, 2019. [Internet]. https://radimrehurek.com/gensim/models/doc2vec.html.
|
9 |
L. V. D. Maaten, and G. Hinton, "Visualizing Data using t-SNE," Journal of Machine Learning Research, vol. 9, pp. 2579-2695, 2008.
|
10 |
H. Lee, K. S. Kim, and H. Kim, "Embedding Model Based on Web-server Log Dataset," the Korea Institute of Military Science and Technology, pp.1183-1184, 2019.
|