共 50 条
- [1] Automatic Detection and Correction of Vulnerabilities using Machine Learning 2017 INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN COMPUTER, ELECTRICAL, ELECTRONICS AND COMMUNICATION (CTCEEC), 2017, : 1062 - 1065
- [3] Correction to: False positives: handling them operationally for automatic pollen monitoring Aerobiologia, 2022, 38 : 597 - 597
- [4] An Approach to Minimize False Positive in SQLI Vulnerabilities Detection Techniques through Data Mining 2014 INTERNATIONAL CONFERENCE ON SIGNAL PROPAGATION AND COMPUTER TECHNOLOGY (ICSPCT 2014), 2014, : 407 - 410
- [5] Data mining approach to web application intrusions detection PHOTONICS APPLICATIONS IN ASTRONOMY, COMMUNICATIONS, INDUSTRY, AND HIGH-ENERGY PHYSICS EXPERIMENTS 2011, 2011, 8008
- [6] Using Outlier Detection to Reduce False Positives in Intrusion Detection 2008 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2008, : 26 - +
- [7] A two-stage process based on data mining and optimization to identify false positives and false negatives generated by intrusion detection systems 2015 11TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2015, : 308 - 311
- [8] Web Application Vulnerabilities Detection Techniques Survey INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (06): : 71 - 75
- [9] Detection of Web Application Vulnerabilities Accelerated by GPU PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MECHANICAL MATERIALS AND MANUFACTURING ENGINEERING (MMME 2016), 2016, 79 : 329 - 331