Editorial: Guest editorial: Special issue on data mining for information security

作者: Yuval Elovici , Lior Rokach , Sahin Albayrak

DOI: 10.1016/J.INS.2013.01.027

关键词: Data scienceComputer scienceInformation security

摘要:

参考文章(21)
Slava Kisilevich, Daniel Keim, Lior Rokach, A Novel Approach to Mining Travel Sequences Using Collections of Geotagged Photos agile conference. pp. 163- 182 ,(2010) , 10.1007/978-3-642-12326-9_9
Asaf Shabtai, Uri Kanonov, Yuval Elovici, Chanan Glezer, Yael Weiss, Andromaly: a behavioral malware detection framework for android devices intelligent information systems. ,vol. 38, pp. 161- 190 ,(2012) , 10.1007/S10844-010-0148-X
Asaf Shabtai, Uri Kanonov, Yuval Elovici, Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method Journal of Systems and Software. ,vol. 83, pp. 1524- 1537 ,(2010) , 10.1016/J.JSS.2010.03.046
Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Koji Nakao, Toward a more practical unsupervised anomaly detection system Information Sciences. ,vol. 231, pp. 4- 14 ,(2013) , 10.1016/J.INS.2011.08.011
Jen-Yan Huang, I-En Liao, Yu-Fang Chung, Kuen-Tzung Chen, Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining Information Sciences. ,vol. 231, pp. 32- 44 ,(2013) , 10.1016/J.INS.2011.03.014
Asaf Shabtai, Robert Moskovitch, Yuval Elovici, Chanan Glezer, Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey Information Security Technical Report. ,vol. 14, pp. 16- 29 ,(2009) , 10.1016/J.ISTR.2009.03.003
Robert Moskovitch, Yuval Elovici, Lior Rokach, Detection of unknown computer worms based on behavioral classification of the host Computational Statistics & Data Analysis. ,vol. 52, pp. 4544- 4566 ,(2008) , 10.1016/J.CSDA.2008.01.028
Asaf shabtai, Dennis Potashnik, Yuval Fledel, Robert Moskovitch, Yuval Elovici, Monitoring, analysis, and filtering system for purifying network traffic of known and unknown malicious content Security and Communication Networks. ,vol. 4, pp. 947- 965 ,(2011) , 10.1002/SEC.229
Mengyu Qiao, Andrew H. Sung, Qingzhong Liu, MP3 audio steganalysis Information Sciences. ,vol. 231, pp. 123- 134 ,(2013) , 10.1016/J.INS.2012.10.013
Yu-Jen Chen, Kao-Shing Hwang, Wei-Cheng Jiang, Policy sharing between multiple mobile robots using decision trees Information Sciences. ,vol. 234, pp. 112- 120 ,(2013) , 10.1016/J.INS.2013.01.008