Starije izmjene na obje strane
Starija izmjena
Novija izmjena
|
Starija izmjena
|
racfor_wiki:primjene_strojnog_ucenja_u_cyber_sigurnosti [2021/01/17 14:04] mpuhalovic [Literatura] |
racfor_wiki:primjene_strojnog_ucenja_u_cyber_sigurnosti [2024/12/05 12:24] (trenutno) |
| |
| |
===== Literatura ===== | ===== Literature ===== |
| |
[1] [[https://www.researchgate.net/publication/283083699_Applications_of_Machine_Learning_in_Cyber_Security|Ford, V., and Siraj, A. Applications of Machine Learning in Cyber Security. Computer Science Department, Tennessee Tech University, 2014. accessed in January 2021.]] | [1] [[https://www.researchgate.net/publication/283083699_Applications_of_Machine_Learning_in_Cyber_Security|Ford, V., and Siraj, A. Applications of Machine Learning in Cyber Security. Computer Science Department, Tennessee Tech University, 2014. Accessed in January 2021.]] |
| |
[2] [[https://www.nccgroup.trust/globalassets/our-research/uk/whitepapers/2017/rise-of-the-machines-preliminaries-wp-new-template-final_web.pdf|Matt Lewis. Rise of the machines: Machine Learning & its cyber security applications. NCC Group, 2017. accessed in January 2021.]] | [2] [[https://www.nccgroup.trust/globalassets/our-research/uk/whitepapers/2017/rise-of-the-machines-preliminaries-wp-new-template-final_web.pdf|Matt Lewis. Rise of the machines: Machine Learning & its cyber security applications. NCC Group, 2017. Accessed in January 2021.]] |
| |
[3] [[https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=633583|Spring, J., Fallon, J., Galyardt, A., Horneman, A., Metcalf, L. B., and Stoner, E. Machine Learning in Cybersecurity: A Guide. Software Engineering Institute, 2019. accessed in January 2021.]] | [3] [[https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=633583|Spring, J., Fallon, J., Galyardt, A., Horneman, A., Metcalf, L. B., and Stoner, E. Machine Learning in Cybersecurity: A Guide. Software Engineering Institute, 2019. Accessed in January 2021.]] |
| |
[4] [[https://arxiv.org/abs/1906.05799|Nguyen, T., T. and Reddi, V., J. Deep Reinforcement Learning for Cyber Security. 2020. accessed in January 2021.]] | [4] [[https://arxiv.org/abs/1906.05799|Nguyen, T. T. and Reddi, V. J. Deep Reinforcement Learning for Cyber Security. 2020. Accessed in January 2021.]] |
| |
[5] [[https://papers.nips.cc/paper/2004/file/283085d30e10513624c8cece7993f4de-Paper.pdf|Chellapilla, K. and Simard, P. Y. Using Machine Learning to Break Visual Human Interaction Proofs (HIPs). Microsoft Research. accessed in January 2021.]] | [5] [[https://papers.nips.cc/paper/2004/file/283085d30e10513624c8cece7993f4de-Paper.pdf|Chellapilla, K. and Simard, P. Y. Using Machine Learning to Break Visual Human Interaction Proofs (HIPs). Microsoft Research. Accessed in January 2021.]] |
| |
[6] [[https://eprints.whiterose.ac.uk/128366/1/MalwareAnalysis.pdf|Milošević, N., Dehghantanha, A. and Choo, K.-K.R. Machine learning aided malware classification of Android applications. 2017. accessed in January 2021.]] | [6] [[https://eprints.whiterose.ac.uk/128366/1/MalwareAnalysis.pdf|Milošević, N., Dehghantanha, A. and Choo, K.-K.R. Machine learning aided malware classification of Android applications. 2017. Accessed in January 2021.]] |
| |
[7][[https://www.researchgate.net/publication/216864662_A_machine_learning_approach_to_keystroke_dynamics_based_user_authentication|Revett, K., Gorunescu, F., Gorunescu, M. and Ene, M. A machine learning approach to keystroke dynamics based user authentication. International Journal of Electronic Security and Digital Forensics. 2007. accessed in January 2021.]] | [7][[https://www.researchgate.net/publication/216864662_A_machine_learning_approach_to_keystroke_dynamics_based_user_authentication|Revett, K., Gorunescu, F., Gorunescu, M. and Ene, M. A machine learning approach to keystroke dynamics based user authentication. International Journal of Electronic Security and Digital Forensics. 2007. Accessed in January 2021.]] |
| |
[8] https://www.usenix.org/legacy/events/sec08/tech/full_papers/gu/gu_html/index.html | [8][[https://www.usenix.org/legacy/events/sec08/tech/full_papers/gu/gu_html/index.html|Gu, G., Perdisci, R., Zhang, J., and Lee, W. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. College of Computing, Georgia Institute of Technology. Accessed in January 2021.]] |
| |
[9] http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.114.1242&rep=rep1&type=pdf | [9][[http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.114.1242&rep=rep1&type=pdf|Abu-Nimeh, S., Nappa, D., Wang, X. and Nair, S. A Comparison of Machine Learning Techniques for Phishing Detection. SMU HACNet Lab, Southern Methodist University. 2007. Accessed in January 2021.]] |
| |
[10] https://people.eecs.berkeley.edu/~adj/publications/paper-files/SecML-MLJ2010.pdf | [10][[https://people.eecs.berkeley.edu/~adj/publications/paper-files/SecML-MLJ2010.pdf|Barreno, M., Nelson, B. Joseph, A. D., Tygar, J.D. The security of machine learning. Computer Science Division, University of California, Berkeley. 2008. Accessed in January 2021.]] |
| |