[BOOK][B] Grammatical inference: learning automata and grammars
C De la Higuera - 2010 - books.google.com
The problem of inducing, learning or inferring grammars has been studied for decades, but
only in recent years has grammatical inference emerged as an independent field with …
only in recent years has grammatical inference emerged as an independent field with …
Method and system for detecting malicious and/or botnet-related domain names
A method and system of detecting a malicious and/or botnet-related domain name,
comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a …
comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a …
Method and system for detecting and responding to attacking networks
A system and method for detecting a first network of compromised computers in a second
network of computers, comprising: collecting Domain Name System (DNS) data for the …
network of computers, comprising: collecting Domain Name System (DNS) data for the …
Anomaly detection and diagnosis algorithms for discrete symbol sequences with applications to airline safety
S Budalakoti, AN Srivastava… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
We present a set of novel algorithms which we call sequenceMiner that detect and
characterize anomalies in large sets of high-dimensional symbol sequences that arise from …
characterize anomalies in large sets of high-dimensional symbol sequences that arise from …
An median graphs: properties, algorithms, and applications
In object prototype learning and similar tasks, median computation is an important technique
for capturing the essential information of a given set of patterns. We extend the median …
for capturing the essential information of a given set of patterns. We extend the median …
{ExecScent}: Mining for New {C&C} Domains in Live Networks with Adaptive Control Protocol Templates
In this paper, we present ExecScent, a novel system that aims to mine new, previously
unknown C&C domain names from live enterprise network traffic. ExecScent automatically …
unknown C&C domain names from live enterprise network traffic. ExecScent automatically …
Method and system for determining whether domain names are legitimate or malicious
4,843,540 A 6, 1989 Stolfo 4,860,201 A 8, 1989 Stolfo et al. 5,363,473 A 11/1994 Stolfo et al.
5,497.486 A 3, 1996 Stolfo et al. 5,563,783 A 10, 1996 Stolfo et al. 5,668,897 A 9, 1997 …
5,497.486 A 3, 1996 Stolfo et al. 5,563,783 A 10, 1996 Stolfo et al. 5,668,897 A 9, 1997 …
Method and system for detecting malicious domain names at an upper DNS hierarchy
7,277,961 7,331,060 7,372,809 7,383,577 7,424,619 7,426,576 7,448,084 7,483,947 7.487,
544 7,536,360 7,634,808 7,639,714 7,657,935 7,665,131 7,698.442 7,752,125 7,752,665 …
544 7,536,360 7,634,808 7,639,714 7,657,935 7,665,131 7,698.442 7,752,125 7,752,665 …
[BOOK][B] Modular system design and evaluation
MS Levin - 2015 - Springer
The frame approach for representing knowledge (ie, collection of frames are linked together
into frame-system) has been suggested by Marvin Minsky. In this approach, the frame …
into frame-system) has been suggested by Marvin Minsky. In this approach, the frame …
Method and system for detecting malware
A system and method of analysis. NX domain names are collected from an asset in a real
network. The NX domain names are domain names that are not registered. The real network …
network. The NX domain names are domain names that are not registered. The real network …