Security papers - PSJoshi/Notes GitHub Wiki
- Data Exfilteration techniques - https://repo.zenk-security.com/Techniques d.attaques . Failles/Exfiltration Techniques - An examination And Emulation.pdf
- Machine learning methods for cyber security - http://drops.dagstuhl.de/opus/volltexte/2013/4356/pdf/dagman-v003-i001-p001-12371.pdf
- Improving network security using big data and machine learning - https://msdn.microsoft.com/en-us/library/mt422593.aspx
- Phish detection model with multi filter approach - http://www.sciencedirect.com/science/article/pii/S1319157817301210
- Malicious javascript detection using machine learning - http://www.cse.chalmers.se/edu/course/FDAT085/public/pdf/olof.pdf
- Classify whether a given page is inaccessible - https://github.com/berkmancenter/py_classifurlr
- Detect phishing or malicious domains - https://www.first.org/resources/papers/conf2016/FIRST-2016-14.pdf
- HP white paper - Analytics in security - https://www.hpe.com/h20195/v2/GetPDF.aspx/a00000103enw.pdf
- DNS traffic analysis for network based malware detection - http://www2.imm.dtu.dk/pubdb/views/edoc_download.php/6309/pdf/imm6309.pdf
- Forecasting cyber security incidents - http://web.eecs.umich.edu/~mingyan/pub/usenix15.pdf
- Security intelligence data mining from Twitter/Facebook/Pastebin - http://www.delaat.net/rp/2014-2015/p09/report.pdf
- Anomaly detection and diagnosis from system logs through deep learning - https://acmccs.github.io/papers/p1285-duA.pdf
- Identifying open source license and risk violations at scale - https://acmccs.github.io/papers/p2169-duanA.pdf
- Real-Time Visualization of Network Behaviors for Situational Awareness - http://vizsec.org/files/2010/Best.pdf
- Automated feature engineering for http tunnel detection - https://www.sciencedirect.com/science/article/pii/S0167404816000080?via%3Dihub
- Periodicity detection in network traffic - https://www.math.leidenuniv.nl/scripties/MasterVanSplunder.pdf
- Monitoring darknets for malicious activities - http://home.iitk.ac.in/~nihkilv/cs396a/pres.pdf
- Detecting slow port scanning with Bro - https://brage.bibsys.no/xmlui/bitstream/handle/11250/144028/RLarsen_2013.pdf?sequence=1
- Design, analysis and presentation of IDS - http://manualzz.com/doc/9555242/design--analysis-and-presentation-of-intrusion-detection-...
- Flow based intrusion detection: techniques and challanges - http://www.sciencedirect.com/science/article/pii/S0167404817301165
- Detection of network scan attacks using flow data - http://referaat.cs.utwente.nl/conference/9/paper/6922/detection-of-network-scan-attacks-using-flow-data.pdf
- Machine learning analysis of real log data - http://css.csail.mit.edu/6.858/2017/projects/bcarter.pdf
- HP Labs papers - https://www.labs.hpe.com/publications
- Analyzing http requests for web intrusion detection - https://digitalcommons.kennesaw.edu/cgi/viewcontent.cgi?referer=https://www.google.co.in/&httpsredir=1&article=1053&context=ccerp
- Neural network analysis of http traffic for attack detection - http://gicap.ubu.es/publications/2015/PDF/2015_c05_Neural_Analisis_of.pdf
- Algorithm for web attack detection - https://hal.inria.fr/hal-01405662/document
- Real traffic log creation for testing of IDS - http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.644.5416&rep=rep1&type=pdf
- Big data analytics for system event logs - https://vtechworks.lib.vt.edu/bitstream/handle/10919/77388/designing-phelkstat-big.pdf
- Interactive labelling stratergy for intrusion detection - https://hal.archives-ouvertes.fr/hal-01636299/document
- A Comparative Study of Machine Learning Algorithms and Their Ensembles for Botnet Detection - http://file.scirp.org/Html/10-1730818_85035.htm
- Log mining using natural language processing - https://hal.laas.fr/hal-01576291/document
- Assessment and design of memory forensic techniques - https://www.usenix.org/system/files/sec19fall_pagani_prepub.pdf