S. Amershi, M. Chickering, M. Steven, B. Drucker, P. Lee et al., ModelTracker, Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI '15, pp.337-346, 2015.
DOI : 10.1145/1518701.1518895

M. Antonakakis, R. Perdisci, Y. Nadji, N. Vasiloglou, S. Abu-nimeh et al., From throw-away traffic to bots : detecting the rise of DGA-based malware, USENIX Security, pp.491-506, 2012.

L. Bilge, D. Balzarotti, W. Robertson, E. Kirda, and C. Kruegel, Disclosure, Proceedings of the 28th Annual Computer Security Applications Conference on, ACSAC '12, pp.129-138, 2012.
DOI : 10.1145/2420950.2420969

D. Chen, K. Rachel, . Bellamy, K. Peter, T. Malkin et al., Diagnostic visualization for non-expert machine learning practitioners: A design study, 2016 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC), pp.87-95, 2016.
DOI : 10.1109/VLHCC.2016.7739669

M. Christodorescu and S. Jha, Testing malware detectors, ACM SIGSOFT Software Engineering Notes, vol.29, issue.4, pp.34-44, 2004.
DOI : 10.1145/1013886.1007518

I. Corona, D. Maiorca, D. Ariu, and G. Giacinto, Lux0R, Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, AISec '14, pp.47-57, 2014.
DOI : 10.1109/TKDE.2013.57

E. Dorothy and . Denning, An intrusion-detection model, IEEE Transactions on software engineering, issue.2, pp.222-232, 1987.

I. Goodfellow, Y. Bengio, and A. Courville, Deep Learning, 2016.

A. James, . Hanley, J. Barbara, and . Mcneil, The meaning and use of the area under a receiver operating characteristic (ROC) curve, Radiology, vol.143, issue.1, pp.29-36, 1982.

A. Kapoor, B. Lee, D. Tan, and E. Horvitz, Interactive optimization for steering machine classification, Proceedings of the 28th international conference on Human factors in computing systems, CHI '10, pp.1343-1352, 2010.
DOI : 10.1145/1753326.1753529

URL : http://www.research.microsoft.com/~akapoor/papers/pap0879-kapoor.pdf

N. Khaled, M. Khasawneh, C. Ozsoy, N. Donovick, D. Abu-ghazaleh et al., Ensemble Learning for Low-Level Hardware-Supported Malware Detection, RAID, pp.3-25

P. Laskov and N. ?rndi?, Static detection of malicious JavaScript-bearing PDF documents, Proceedings of the 27th Annual Computer Security Applications Conference on, ACSAC '11, pp.373-382, 2011.
DOI : 10.1145/2076732.2076785

URL : http://www-rsec.cs.uni-tuebingen.de/laskov/papers/acsac2011.pdf

V. Oisin-mac-aodha, . Stathopoulos, J. Gabriel, M. Brostow, M. Terry et al., Putting the Scientist in the Loop?Accelerating Scientific Progress with Interactive Machine Learning, Pattern Recognition (ICPR), 2014 22nd International Conference on, pp.9-17, 2014.

T. May, A. Bannach, J. Davey, T. Ruppert, and J. Kohlhammer, Guiding feature subset selection with an interactive visualization, 2011 IEEE Conference on Visual Analytics Science and Technology (VAST), pp.111-120, 2011.
DOI : 10.1109/VAST.2011.6102448

F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion et al., Scikit-learn : Machine Learning in Python, JMLR, vol.12, pp.2825-2830, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00650905

K. Rieck, Computer Security and Machine Learning: Worst Enemies or Best Friends?, 2011 First SysSec Workshop, pp.107-110, 2011.
DOI : 10.1109/SysSec.2011.16

B. Settles, Active Learning, Synthesis Lectures on Artificial Intelligence and Machine Learning, vol.6, issue.1, pp.1-114, 2012.
DOI : 10.2200/S00429ED1V01Y201207AIM018

Y. Shen and O. Thonnard, MR-TRIAGE: Scalable multi-criteria clustering for big data security intelligence applications, 2014 IEEE International Conference on Big Data (Big Data), pp.627-635, 2014.
DOI : 10.1109/BigData.2014.7004285

C. Smutz and A. Stavrou, Malicious PDF detection using metadata and structural features, Proceedings of the 28th Annual Computer Security Applications Conference on, ACSAC '12
DOI : 10.1145/2420950.2420987

URL : http://cs.gmu.edu/~astavrou/research/Malicious_PDF_Detection_ACSAC_12.pdf

C. Smutz and A. Stavrou, Malicious PDF detection using metadata and structural features, Proceedings of the 28th Annual Computer Security Applications Conference on, ACSAC '12, pp.239-248, 2012.
DOI : 10.1145/2420950.2420987

URL : http://cs.gmu.edu/~astavrou/research/Malicious_PDF_Detection_ACSAC_12.pdf

N. ?rndic and P. Laskov, Detection of malicious pdf files based on hierarchical document structure, NDSS, 2013.

J. Talbot, B. Lee, A. Kapoor, S. Desney, and . Tan, EnsembleMatrix, Proceedings of the 27th international conference on Human factors in computing systems, CHI 09, pp.1283-1292, 2009.
DOI : 10.1145/1518701.1518895

K. Veeramachaneni and I. Arnaldo, AI2 : Training a big data machine to defend, DataSec, pp.49-54, 2016.
DOI : 10.1109/bigdatasecurity-hpsc-ids.2016.79

L. Kiri and . Wagstaff, Machine Learning that Matters, Proceedings of the 29th International Conference on Machine Learning (ICML-12), pp.529-536, 2012.