ModelTracker, Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI '15, pp.337-346, 2015. ,
DOI : 10.1145/1518701.1518895
From throw-away traffic to bots : detecting the rise of DGA-based malware, USENIX Security, pp.491-506, 2012. ,
Disclosure, Proceedings of the 28th Annual Computer Security Applications Conference on, ACSAC '12, pp.129-138, 2012. ,
DOI : 10.1145/2420950.2420969
Diagnostic visualization for non-expert machine learning practitioners: A design study, 2016 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC), pp.87-95, 2016. ,
DOI : 10.1109/VLHCC.2016.7739669
Testing malware detectors, ACM SIGSOFT Software Engineering Notes, vol.29, issue.4, pp.34-44, 2004. ,
DOI : 10.1145/1013886.1007518
Lux0R, Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, AISec '14, pp.47-57, 2014. ,
DOI : 10.1109/TKDE.2013.57
An intrusion-detection model, IEEE Transactions on software engineering, issue.2, pp.222-232, 1987. ,
Deep Learning, 2016. ,
The meaning and use of the area under a receiver operating characteristic (ROC) curve, Radiology, vol.143, issue.1, pp.29-36, 1982. ,
Interactive optimization for steering machine classification, Proceedings of the 28th international conference on Human factors in computing systems, CHI '10, pp.1343-1352, 2010. ,
DOI : 10.1145/1753326.1753529
URL : http://www.research.microsoft.com/~akapoor/papers/pap0879-kapoor.pdf
Ensemble Learning for Low-Level Hardware-Supported Malware Detection, RAID, pp.3-25 ,
Static detection of malicious JavaScript-bearing PDF documents, Proceedings of the 27th Annual Computer Security Applications Conference on, ACSAC '11, pp.373-382, 2011. ,
DOI : 10.1145/2076732.2076785
URL : http://www-rsec.cs.uni-tuebingen.de/laskov/papers/acsac2011.pdf
Putting the Scientist in the Loop?Accelerating Scientific Progress with Interactive Machine Learning, Pattern Recognition (ICPR), 2014 22nd International Conference on, pp.9-17, 2014. ,
Guiding feature subset selection with an interactive visualization, 2011 IEEE Conference on Visual Analytics Science and Technology (VAST), pp.111-120, 2011. ,
DOI : 10.1109/VAST.2011.6102448
Scikit-learn : Machine Learning in Python, JMLR, vol.12, pp.2825-2830, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00650905
Computer Security and Machine Learning: Worst Enemies or Best Friends?, 2011 First SysSec Workshop, pp.107-110, 2011. ,
DOI : 10.1109/SysSec.2011.16
Active Learning, Synthesis Lectures on Artificial Intelligence and Machine Learning, vol.6, issue.1, pp.1-114, 2012. ,
DOI : 10.2200/S00429ED1V01Y201207AIM018
MR-TRIAGE: Scalable multi-criteria clustering for big data security intelligence applications, 2014 IEEE International Conference on Big Data (Big Data), pp.627-635, 2014. ,
DOI : 10.1109/BigData.2014.7004285
Malicious PDF detection using metadata and structural features, Proceedings of the 28th Annual Computer Security Applications Conference on, ACSAC '12 ,
DOI : 10.1145/2420950.2420987
URL : http://cs.gmu.edu/~astavrou/research/Malicious_PDF_Detection_ACSAC_12.pdf
Malicious PDF detection using metadata and structural features, Proceedings of the 28th Annual Computer Security Applications Conference on, ACSAC '12, pp.239-248, 2012. ,
DOI : 10.1145/2420950.2420987
URL : http://cs.gmu.edu/~astavrou/research/Malicious_PDF_Detection_ACSAC_12.pdf
Detection of malicious pdf files based on hierarchical document structure, NDSS, 2013. ,
EnsembleMatrix, Proceedings of the 27th international conference on Human factors in computing systems, CHI 09, pp.1283-1292, 2009. ,
DOI : 10.1145/1518701.1518895
AI2 : Training a big data machine to defend, DataSec, pp.49-54, 2016. ,
DOI : 10.1109/bigdatasecurity-hpsc-ids.2016.79
Machine Learning that Matters, Proceedings of the 29th International Conference on Machine Learning (ICML-12), pp.529-536, 2012. ,