[2] |
国家互联网应急中心. 2016 年中国互联网网络安全报告[R]. 国家互联网应急中心. 2017.
|
|
NIEC. A survey of china's internet security situation[R]. China Internet Network Information Center. National Internet Emergency Center. 2017
|
[3] |
LI Z , ZHANG K , XIE Y ,et al. Knowing your enemy:understanding and detecting malicious web advertising[C]// The 2012 ACM Conference on Computer and Communications Security. 2012: 674-686.
|
[4] |
GU G , ZHANG J , LEE W . BotSniffer:detecting botnet command and control channels in network traffic[C]// The Network and Distributed System Security Symposium. 2008.
|
[5] |
GU G , PERDISCI R , ZHANG J ,et al. BotMiner:clustering analysis of network traffic for protocol-and structure-independent botnet detection[C]// The 17th USENIX Security Symposium. 2018: 139-154.
|
[6] |
CAO J , LI Q , Y JI ,et al. Detection of forwarding-based malicious URLs in online social networks[J]. International Journal of Parallel Programming, 2016,44(1): 163-180.
|
[7] |
ADEWOLE K S , ANUAR N B ,et al. Malicious accounts:dark of the social networks[J]. Journal of Network and Computer Applications, 2017,79: 41-67.
|
[8] |
SHIN E C R , SONG D , MOAZZEZI R . Recognizing functions in binaries with neural networks[C]// USENIX Security Symposium. 2015: 611-626.
|
[9] |
YUAN Z , LU Y , WANG Z ,et al. Droid-sec:deep learning in android malware detection[C]// ACM SIGCOMM Computer Communication Review. 2014,44(4): 371-372.
|
[10] |
YUAN Z , LU Y , XUE Y . Droiddetector:android malware characterization and detection using deep learning[J]. Tsinghua Science and Technology, 2016,21(1): 114-123.
|
[11] |
KIM J , KIM J , THU H L T ,et al. Long short term memory recurrent neural network classifier for intrusion detection[C]// Platform Technology and Service (PlatCon),2016 International Conference on. IEEE, 2016: 1-5.
|
[12] |
SALAMA M A , EID H F , RAMADAN R A ,et al. Hybrid intelligent intrusion detection scheme[M]. Soft Berlin Computing in Industrial Applications. 2011: 293-303.
|
[1] |
中国互联网络信息中心. 中国互联网络发展状况统计报告[R]. 中国互联网络信息中心. 2018.
|
|
INIC. The statistical report on internet development in China[R]. China Internet Network Information Center. 2018.
|
[13] |
NASRABADI N M . Pattern recognition and machine learning[J]. Journal of Electronic Imaging, 2007,16(4):049901
|
[14] |
ROSENBLATT F . The perceptron:a probabilistic model for information storage and organization in the brain[J]. Psychological Review, 1958,65(6): 386.
|
[15] |
RUMELHART D E , HINTON G E , WILLIAMS R J . Learning representations by back-propagating errors[J]. Nature, 1986,323(6088): 533.
|
[16] |
WATSON M R , MARNERIDES A K , MAUTHE A ,et al. Malware detection in cloud computing infrastructures[J]. IEEE Transactions on Dependable and Secure Computing, 2016,13(2): 192-205.
|
[17] |
MO Y , XING L , ZHONG F ,et al. Reliability evaluation of network systems with dependent propagated failures using decision diagrams[J]. IEEE Transactions on Dependable and Secure Computing, 2016,13(6): 672-683.
|