1 |
Lee Sang-Hun, Kim Won, Do Kyoung-Hwa, Jun Moon-Seog, "WAVScanner: Design and Implement of Web Based Anti-Virus Scanner", Journal of Internet Computing and Services, Vol. 5, No. 3, pp. 11-24, 2004. https://www.koreascience.or.kr/article/JAKO200414714103092.page
|
2 |
K. K. Vasan, B. Surendiran, "Dimensionality Reduction Using Principal Component Analysis for Network Intrusion Detection", Perspectives on Science, vol. 8, pp. 510-512, 2016. https://doi.org/10.1016/j.pisc.2016.05.010
DOI
|
3 |
Cho San, Mie Su Thwin, "Proposed Effective Feature Extraction and Selection for Malicious Software Classification", Advances in Biometrics, pp.51-71,2019. https://doi.org/10.1007/978-3-030-30436-2_3
|
4 |
Oh-Ryun Kwon, Kyong-Pil Min, Jun-Chul Chun, "Real-Time Face Recognition Based on Subspace and LVQ Classifier",Journal of Internet Computing and Services, Vol. 8, No. 3, pp. 19-32, Jun. 2007.
|
5 |
Zhao, Juan, Sachin Shetty,Jan Wei Pan, "Feature-based transfer learning for network security", MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), pp.17-22, 2017. https://doi.org/10.1109/MILCOM.2017.8170749
|
6 |
Umarani, S, D. Sharmila, "Predicting application layer DDoS attacks using machine learning algorithms", International Journal of Computer and Systems Engineering, Vol. 8, No. 10, pp. 1912-1917, 2015. https://doi.org/10.5281/zenodo.1099004
|
7 |
Nguyen Hoai-Vu, Yongsun Choi, "Proactive detection of DDoS attacks utilizingk-NN classifier in an anti-DDoS framework", International Journal of Electrical, Computer, and Systems Engineering, Vol. 4, No. 3, pp. 537-542, 2010. https://pdfs.semanticscholar.org/38fe/3f1f9a7913a561a2878b8498f91b1550ab87.pdf
|
8 |
Henchiri Olivier, Nathalie Japkowicz, "A feature selection and evaluation scheme for computer virus detection", Sixth International Conference on Data Mining (ICDM'06), IEEE, pp. 891-895, 2006. https://doi.org/10.1109/ICDM.2006.4
|
9 |
Schultz M G, Eskin E, Zadok F, "Data mining methods for detection of new malicious executables", Proceedings 2001 IEEE Symposium on Security and Privacy, S&P 2001, pp. 38-49, 2001. https://doi.org/10.1109/SECPRI.2001.924286
|
10 |
Oliveira Angelo, Renato Jose Sassi, "Behavioral Malware Detection Using Deep Graph Convolutional Neural Networks", 2019. https://scholar.google.com.hk/scholar?hl=zh-CN&as_sdt=0%2C5&q=Behavioral+Malware+Detection+Using+Deep+Graph+Convolutional+Neural+Networks&btnG
|
11 |
Jeongwhan Choi, "Iceberg-Ship Classification in SAR Images Using Convolutional Neural Network with Transfer Learning", Journal of Internet Computing and Services, Vol. 19, No. 4, pp. 35-44, 2018. http://www.jics.or.kr/digital-library/15357
DOI
|
12 |
Matt, Pietrek, "Peering inside the PE: a tour of the Win32 portable executable file format", MSDN Library, 1994. https://www.cnblogs.com/antoniozhou/archive/2008/10/22/1317274.html
|