최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Journal of Internet Computing and Services = 인터넷정보학회논문지, v.22 no.4, 2021년, pp.1 - 11
윤지영 (Department of Software, Gachon University) , 김동욱 (Department of Computer Engineering, Gachon University) , 신건윤 (Department of Computer Engineering, Gachon University) , 김상수 (Agency for Defense Development) , 한명묵 (Department of Software, Gachon University)
As the Internet developed, various and complex cyber attacks began to emerge. Various detection systems were used outside the network to defend against attacks, but systems and studies to detect attackers inside were remarkably rare, causing great problems because they could not detect attackers ins...
BA Powell, "Detecting malicious logins as graph anomalies.", Journal of Information Security and Applications, Vol. 54, No. 102557, 2020. https://doi.org/10.1016/j.jisa.2020.102557.
T Bai, H Bian, M. A. Salahuddin, A. A. Daya, N Limam, R Boutaba, "RDP-based Lateral Movement detection using Machine Learning", Computer Communications, Vol. 165, pp. 9-19., 2021. https://doi.org/10.1016/j.comcom.2020.10.013
M. Hind, "Explaining explainable AI." XRDS: Crossroads, The ACM Magazine for Students, Vol.25 No.3 pp. 16-19, 2019, https://doi.org/10.1145/3313096
M Soria-Machado, D Abolins, C Boldea, and K Socha, "Detecting Lateral Movements in Windows Infrastructure", CERT-EU Security Whitepaper 17-002, 2017. https://media.cert.europa.eu/static/WhitePapers/CERT-EU_SWP_17-002_Lateral_Movements.pdf
L Page, S Brin, R Motwani, and T Winograd, "The PageRank citation ranking: Bringing order to the web", Stanford InfoLab., 1999. http://ilpubs.stanford.edu:8090/422/
S Lundberg, and SI Lee, "A Unified Approach to Interpreting Model Predictions", arXiv preprint arXiv:1705.07874, 2017. https://arxiv.org/abs/1705.07874v2
JH Friedman, "Greedy Function Approximation: A Gradient Boosting Machine", The Annals of Statistics, Vol. 29, No. 5, pp. 1189-1232, 2001. https://www.jstor.org/stable/2699986
JR Quinlan, "Induction of decision trees", Machine learning, Vol. 1, No. 1, pp. 81-106, 1986. https://doi.org/10.1007/BF00116251
DJ Hand, and K Yu, "Idiot's Bayes-not so stupid after all?", International statistical review, Vol. 69, No. 3, pp. 385-398, 2001, https://doi.org/10.1111/j.1751-5823.2001.tb00465.x
J Friedman, T Hastie, and R Tibshirani, "Additive logistic regression: a statistical view of boosting (with discussion and a rejoinder by the authors)", Annals of statistics, Vol. 28, No.2, pp. 337-407, 2000. https://doi.org/10.1214/aos/1016218223
MJM Turcotte, AD Kent, and C Hash, "Unified Host and Network Data Set", Data Science for Cyber-Security, pp. 1-22, 2018. https://doi.org/10.1142/9781786345646_001
AD Kent, "Comprehensive, multi-source cyber-security events data set", No. LA-UR-15-23810. Los Alamos National Lab.(LANL), Los Alamos, NM (United States), 2015. https://doi.org/10.17021/1179829
H He, and Y Ma, "Imbalanced Learning: Foundations, Algorithms, and Applications", 2013. https://doi.org/10.1002/9781118646106
C Rudin, "Stop explaining black box machine learning models for high stakes decisions and use interpretable models instead." Nature Machine Intelligence Vol. 1, No. 5, pp. 206-215, 2019. https://doi.org/10.1038/s42256-019-0048-x
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.