[1] |
STOJANOVI? B , HOFER-SCHMITZ K , KLEB U . APT datasets and attack modeling for automated detection methods:a review[J]. Computers & Security, 2020,92: 101734.
|
[2] |
WANG W , ZHU M , ZENG X W ,et al. Malware traffic classification using convolutional neural network for representation learning[C]// Proceedings of 2017 International Conference on Information Networking (ICOIN). Piscataway:IEEE Press, 2017: 712-717.
|
[3] |
LUO Y , XIAO Y , CHENG L ,et al. Deep learning-based anomaly detection in cyber-physical systems:progress and opportunities[J]. ACM Computing Surveys, 2021,54(5): 106: 1-36.
|
[4] |
MILAJERDI S M , GJOMEMO R , ESHETE B ,et al. HOLMES:real-time APT detection through correlation of suspicious information flows[C]// Proceedings of 2019 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2019: 1137-1152.
|
[5] |
MARCHETTI M , PIERAZZI F , COLAJANNI M ,et al. Analysis of high volumes of network traffic for advanced persistent threat detection[J]. Computer Networks, 2016,109: 127-141.
|
[6] |
HAN X Y , PASQUIER T , BATES A ,et al. Unicorn:runtime provenance-based detector for advanced persistent threats[C]// Proceedings 2020 Network and Distributed System Security Symposium. Reston:Internet Society, 2020: 1-19.
|
[7] |
LANGNER R . Stuxnet:dissecting a cyberwarfare weapon[J]. IEEE Security & Privacy, 2011,9(3): 49-51.
|
[8] |
MUCKIN M , FITCH S C . A threat-driven approach to cyber security[J]. Lockheed Martin Corporation, 2015,3(1): 1-8.
|
[9] |
宋文纳, 彭国军, 傅建明 ,等. 恶意代码演化与溯源技术研究[J]. 软件学报, 2019,30(8): 2229-2267.
|
|
SONG W N , PENG G J , FU J M ,et al. Research on malicious code evolution and traceability technology[J]. Journal of Software, 2019,30(8): 2229-2267.
|
[10] |
GIURA P , WANG W . A context-based detection framework for advanced persistent threats[C]// Proceedings of 2012 International Conference on Cyber Security. Piscataway:IEEE Press, 2012: 69-74.
|
[11] |
KIM Y H , PARK W H . A study on cyber threat prediction based on intrusion detection event for APT attack detection[J]. Multimedia Tools and Applications, 2014,71(2): 685-698.
|
[12] |
付钰, 李洪成, 吴晓平 ,等. 基于大数据分析的APT攻击检测研究综述[J]. 通信学报, 2015,36(11): 1-14.
|
|
FU Y , LI H C , WU X P ,et al. Detecting APT attacks:a survey from the perspective of big data analysis[J]. Journal on Communications, 2015,36(11): 1-14.
|
[13] |
YANG H P , . Method for behavior-prediction of APT attack based on dynamic Bayesian game[C]// Proceedings of 2016 IEEE International Conference on Cloud Computing and Big Data Analysis. Piscataway:IEEE Press, 2016: 177-182.
|
[14] |
张小松, 牛伟纳, 杨国武 ,等. 基于树型结构的APT攻击预测方法[J]. 电子科技大学学报, 2016,45(4): 582-588.
|
|
ZHANG X S , NIU W N , YANG G W ,et al. Method for APT prediction based on tree structure[J]. Journal of University of Electronic Science and Technology of China, 2016,45(4): 582-588.
|
[15] |
MILAJERDI S M , ESHETE B , GJOMEMO R ,et al. POIROT:aligning attack behavior with kernel audit records for cyber threat hunting[C]// Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2019: 1813-1830.
|
[16] |
HUMPHREYS K , GAIZAUSKAS R , AZZAM S ,et al. University of sheffield:description of the LaSIE-II system as used for MUC-7[C]// Proceedings of the Seventh Message Understanding Conferences. Stroudsburg:ACL Press, 1998: 1-20.
|
[17] |
BLACK W J , RINALDI F R , MOWATT D . Facile:description of the NE system used for MUC-7[C]// Proceedings of the Seventh Message Understanding Conference. Stroudsburg:ACL Press, 1998: 1-10.
|
[18] |
COLLINS M , SINGER Y . Unsupervised models for named entity classification[C]// Proceedings of the Joint SIGDAT Conference on Empirical Methods in Natural Language Processing and Very Large Corpora. Stroudsburg:ACL Press, 1999: 100-110.
|
[19] |
FREITAG D , MCCALLUM A . Information extraction with HMMs and shrinkage[C]// Proceedings of the AAAI-99 Workshop on Machine Learning for Information Extraction. Palo Alto:AAAI Press, 1999: 31-36.
|
[20] |
CHIEU H L , NG H T . Named entity recognition:a maximum entropy approach using global information[C]// Proceedings of the 19th International Conference on Computational Linguistics. Stroudsburg:ACL Press, 2002: 1-7.
|
[21] |
LI Y Y , BONTCHEVA K , CUNNINGHAM H . SVM based learning system for information extraction[C]// International Workshop on Deterministic and Statistical Methods in Machine Learning. Berlin:Springer, 2005: 319-339.
|
[22] |
MCCALLUM A , LI W . Early results for named entity recognition with conditional random fields,feature induction and web-enhanced lexicons[C]// Proceedings of the Seventh Conference on Natural Language Learning at HLT-NAACL. Stroudsburg:ACL Press, 2003: 188-191.
|
[23] |
HAMMERTON J , . Named entity recognition with long short-term memory[C]// Proceedings of the Seventh Conference on Natural Language Learning at HLT-NAACL. Stroudsburg:ACL Press, 2003: 172-175.
|
[24] |
STRUBELL E , VERGA P , BELANGER D ,et al. Fast and accurate entity recognition with iterated dilated convolutions[C]// Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing. Stroudsburg:ACL Press, 2017: 2670-2680.
|
[25] |
ZHANG Y , YANG J . Chinese NER using lattice LSTM[C]// Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics. Stroudsburg:ACL Press, 2018: 1554-1564.
|
[26] |
张若彬, 刘嘉勇, 何祥 . 基于BLSTM-CRF模型的安全漏洞领域命名实体识别[J]. 四川大学学报(自然科学版), 2019,56(3): 469-475.
|
|
ZHANG R B , LIU J Y , HE X . Named entity recognition for vulnerabilities based on BLSTM-CRF model[J]. Journal of Sichuan University (Natural Science Edition), 2019,56(3): 469-475.
|
[27] |
DEVLIN J , CHANG M W , LEE K ,et al. BERT:pre-training of deep bidirectional transformers for language understanding[C]// Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics:Human Language Technologies. Stroudsburg:ACL Press, 2019. 4171-4186.
|