Page 320 - 《软件学报》2021年第5期
P. 320
1544 Journal of Software 软件学报 Vol.32, No.5, May 2021
[22] Kolosnjaji B, Demontis A, Biggio B, et al. Adversarial malware binaries: Evading deep learning for malware detection in
executables. In: Proc. of the 2018 26th European Signal Processing Conf. (EUSIPCO). IEEE, 2018. 533−537.
[23] Feily M, Shahrestani A, Ramadass S. A survey of botnet and botnet detection. In: Proc. of the 2009 3rd Int’l Conf. on Emerging
Security Information, Systems and Technologies. IEEE, 2009. 268−273.
[24] Danziger M, Henriques MAA. Attacking and defending with intelligent botnets. In: Proc. of the XXXV Brazilian Symp. on
Telecommunications and Signal Processing-SBrT. 2017. 457−461.
[25] Mohurle S, Patil M. A brief study of wannacry threat: Ransomware attack 2017. Int’l Journal of Advanced Research in Computer
Science, 2017,8(5):1938−1940.
[26] Virvilis N, Gritzalis D. The big four-what we did wrong in advanced persistent threat detection? In: Proc. of the 2013 Int’l Conf. on
Availability, Reliability and Security. IEEE, 2013. 248−254.
[27] https://vicariousinc.tumblr.com/post/65316134613/vicarious-ai-passes-first-turing-test-captcha
[28] Seymour J, Tully P. Weaponizing data science for social engineering: Automated E2E spear phishing on Twitter. Black Hat USA,
2016,37:1−39.
[29] Anagnostopoulos T, Anagnostopoulos C, Hadjiefthymiades S. Enabling attack behavior prediction in ubiquitous environments. In:
Proc. of the Int’l Conf. on Pervasive Services (ICPS 2005). IEEE, 2005. 425−428.
[30] Kou G, Wang S, Tang G. Research on key technologies of network security situational awareness for attack tracking prediction.
Chinese Journal of Electronics, 2019,28(1):162−171.
[31] Meng J. Research on key techniques in network security situation assessment and prediction [Ph.D. Thesis]. Nanjing: Nanjing
University of Science and Technology, 2012 (in Chinese with English abstract).
[32] Chen C, Yan BP. Network attack forecast algorithm for multi-step attack. Computer Engineering, 2011,37(5):172−174,178 (in
Chinese with English abstract).
[33] Shen Y, Mariconti E, Vervier PA, et al. Tiresias: Predicting security events through deep learning. In: Proc. of the 2018 ACM
SIGSAC Conf. on Computer and Communications Security. 2018. 592−605.
[34] Kishioka K, Hongyo K, Kimura T, et al. Prediction method of infection spreading with CNN for self-evolving botnets. In: Proc. of
the 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA ASC). IEEE, 2018.
1810−1815.
[35] Lu S, Ying L, Lin W, et al. New era of deeplearning-based malware intrusion detection: The malware detection and prediction
based on deep learning. arXiv preprint arXiv:1907.08356, 2019.
[36] Ali W, Ahmed AA. Hybrid intelligent phishing website prediction using deep neural networks with genetic algorithm-based feature
selection and weighting. IET Information Security, 2019,13(6):659−669.
[37] Bru¨ckner M, Kanzow C, Scheffer T. Static prediction games for adversarial learning problems. Journal of Machine Learning
Research, 2012,13(1):2617−2654.
[38] Li Y, Deng Y, Xiao Y, et al. Attack and defense strategies in complex networks based on game theory. Journal of Systems Science
and Complexity, 2019,32(6):1630−1640.
[39] Bulò SR, Biggio B, Pillai I, et al. Randomized prediction games for adversarial machine learning. IEEE Trans. on Neural Networks
and Learning Systems, 2016,28(11):2466−2478.
[40] Haopu Y. Method for behavior-prediction of APT attack based on dynamic Bayesian game. In: Proc. of the 2016 IEEE Int’l Conf.
on Cloud Computing and Big Data Analysis (ICCCBDA). IEEE, 2016. 177−182.
[41] Yassin W, Abdullah R, Abdollah MF, et al. An IoT botnet prediction model using frequency based dependency graph: Proof-of-
concept. In: Proc. of the 2019 7th Int’l Conf. on Information Technology: IoT and Smart City. 2019. 344−352.
[42] GhasemiGol M, Ghaemi-Bafghi A, Takabi H. A comprehensive approach for network attack forecasting. Computers & Security,
2016,58:83−105.
[43] Nandi AK, Medal HR, Vadlamani S. Interdicting attack graphs to protect organizations from cyber attacks: A bi-level defender-
attacker model. Computers & Operations Research, 2016,75:118−131.
[44] Amer E, Zelinka I. A dynamic Windows malware detection and prediction method based on contextual understanding of API call
sequence. Computers & Security, 2020,92:Article No.101760.