Page 320 - 《软件学报》2021年第5期
P. 320

1544                                     Journal of Software  软件学报 Vol.32, No.5,  May 2021

                [22]    Kolosnjaji  B,  Demontis A, Biggio B,  et  al. Adversarial malware  binaries: Evading  deep learning  for malware  detection in
                     executables. In: Proc. of the 2018 26th European Signal Processing Conf. (EUSIPCO). IEEE, 2018. 533−537.
                [23]    Feily M, Shahrestani A, Ramadass S. A survey of botnet and botnet detection. In: Proc. of the 2009 3rd Int’l Conf. on Emerging
                     Security Information, Systems and Technologies. IEEE, 2009. 268−273.
                [24]    Danziger M,  Henriques  MAA. Attacking  and defending with intelligent  botnets. In: Proc.  of the  XXXV  Brazilian Symp. on
                     Telecommunications and Signal Processing-SBrT. 2017. 457−461.
                [25]    Mohurle S, Patil M. A brief study of wannacry threat: Ransomware attack 2017. Int’l Journal of Advanced Research in Computer
                     Science, 2017,8(5):1938−1940.
                [26]    Virvilis N, Gritzalis D. The big four-what we did wrong in advanced persistent threat detection? In: Proc. of the 2013 Int’l Conf. on
                     Availability, Reliability and Security. IEEE, 2013. 248−254.
                [27]    https://vicariousinc.tumblr.com/post/65316134613/vicarious-ai-passes-first-turing-test-captcha
                [28]    Seymour J, Tully P. Weaponizing data science for social engineering: Automated E2E spear phishing on Twitter. Black Hat USA,
                     2016,37:1−39.
                [29]    Anagnostopoulos T, Anagnostopoulos C, Hadjiefthymiades S. Enabling attack behavior prediction in ubiquitous environments. In:
                     Proc. of the Int’l Conf. on Pervasive Services (ICPS 2005). IEEE, 2005. 425−428.
                [30]    Kou G, Wang S, Tang G. Research on key technologies of network security situational awareness for attack tracking prediction.
                     Chinese Journal of Electronics, 2019,28(1):162−171.
                [31]    Meng J.  Research on key techniques in network  security situation  assessment  and prediction [Ph.D.  Thesis].  Nanjing:  Nanjing
                     University of Science and Technology, 2012 (in Chinese with English abstract).
                [32]    Chen C, Yan BP. Network attack  forecast algorithm for multi-step attack. Computer  Engineering,  2011,37(5):172−174,178 (in
                     Chinese with English abstract).
                [33]    Shen Y, Mariconti E, Vervier PA, et al. Tiresias: Predicting security  events through deep learning. In: Proc.  of the 2018 ACM
                     SIGSAC Conf. on Computer and Communications Security. 2018. 592−605.
                [34]    Kishioka K, Hongyo K, Kimura T, et al. Prediction method of infection spreading with CNN for self-evolving botnets. In: Proc. of
                     the 2018 Asia-Pacific Signal  and Information Processing Association  Annual Summit  and  Conf.  (APSIPA  ASC).  IEEE, 2018.
                     1810−1815.
                [35]    Lu S, Ying L, Lin W,  et al. New  era of deeplearning-based  malware  intrusion detection:  The  malware detection and prediction
                     based on deep learning. arXiv preprint arXiv:1907.08356, 2019.
                [36]    Ali W, Ahmed AA. Hybrid intelligent phishing website prediction using deep neural networks with genetic algorithm-based feature
                     selection and weighting. IET Information Security, 2019,13(6):659−669.
                [37]    Bru¨ckner  M,  Kanzow  C, Scheffer  T. Static prediction games for  adversarial  learning problems. Journal of  Machine Learning
                     Research, 2012,13(1):2617−2654.
                [38]    Li Y, Deng Y, Xiao Y, et al. Attack and defense strategies in complex networks based on game theory. Journal of Systems Science
                     and Complexity, 2019,32(6):1630−1640.
                [39]    Bulò SR, Biggio B, Pillai I, et al. Randomized prediction games for adversarial machine learning. IEEE Trans. on Neural Networks
                     and Learning Systems, 2016,28(11):2466−2478.
                [40]    Haopu Y. Method for behavior-prediction of APT attack based on dynamic Bayesian game. In: Proc. of the 2016 IEEE Int’l Conf.
                     on Cloud Computing and Big Data Analysis (ICCCBDA). IEEE, 2016. 177−182.
                [41]    Yassin W, Abdullah R, Abdollah MF, et al. An IoT botnet prediction model using frequency based dependency graph: Proof-of-
                     concept. In: Proc. of the 2019 7th Int’l Conf. on Information Technology: IoT and Smart City. 2019. 344−352.
                [42]    GhasemiGol M, Ghaemi-Bafghi A, Takabi H. A comprehensive approach for network attack forecasting. Computers & Security,
                     2016,58:83−105.
                [43]    Nandi AK, Medal HR, Vadlamani S. Interdicting attack graphs to protect organizations from cyber attacks: A bi-level defender-
                     attacker model. Computers & Operations Research, 2016,75:118−131.
                [44]    Amer E, Zelinka I. A dynamic Windows malware detection and prediction method based on contextual understanding of API call
                     sequence. Computers & Security, 2020,92:Article No.101760.
   315   316   317   318   319   320   321   322   323   324   325