Entropy | Free Full-Text | A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies
Future Internet | Free Full-Text | Deep Learning for Vulnerability and Attack Detection on Web Applications: A Systematic Literature Review
Opcode Sequences As Representation of Executables For Data-Mining-Based Unknown Malware Detection (Elsevier-2013) PDF | PDF | Cross Validation (Statistics) | Machine Learning
nystrom robert crafting interpreters
Ring 0/-2 Rootkits: bypassing defenses -- DEF CON 2018 USA