@incollection{, 645EBD0D51FA522E240E0A0A6E8DDF17 , author={{NiranjanA} and {NitishA} and {P DeepaShenoy} and {UVCE}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1655172 } @book{b0, , title={{Cryptography: Theory and Practice 3rd Edition}} , author={{ DRStinson }} , year={2006} , address={Text Book} } @incollection{b1, , title={{Robust Laser Speckle Authentication System through Data Mining Techniques}} , author={{ C.-HYeh } and { GLee } and { C.-Y.Lin }} , journal={{IEEE Transactions on Industrial Informatics}} 11 2 , year={2015} } @incollection{b2, , title={{Data Mining for Security Purpose & its Solitude Suggestions}} , author={{ SKhan } and { ASharma } and { ASZamani } and { AAkhtar }} , journal={{International Journal of Technology Enhancements and Emerging Engineering Research}} 1 7 , year={2012} } @book{b3, , title={{Soft Computing for Data Mining Applications}} , author={{ K RVenugopal } and { KSrinivasa } and { L MPatnaik }} , year={2009} , publisher={Springer} } @incollection{b4, , title={{PIB: Profiling Influential Blogger in Online Social Networks, A Knowledge Driven Data Mining Approach}} , author={{ G UVasanthakumar } and { BagulPrajakta } and { DeepaShenoy } and { K RVenugopal } and { L MPatnaik }} , booktitle={{11 th International Multi-Conference on Information Processing (IMCIP)}} , year={2015} 54 } @incollection{b5, , title={{Anonymization of Location Data Does Not Work: A Large-Scale Measurement Study}} , author={{ HZang } and { JBolot }} , booktitle={{Proceedings of the 17th Annual International Conference on Mobile Computing and Networking}} the 17th Annual International Conference on Mobile Computing and Networking , year={2011} } @incollection{b6, , title={{Data Privacy Through Optimal k-Anonymization}} , author={{ RJBayardo } and { R }} , booktitle={{21st International Conference on Data Engineering (ICDE'05)}} , year={2005} } @incollection{b7, , title={{Providing k-Anonymity in Data Mining}} , author={{ AFriedman } and { RWolff } and { ASchuster }} , journal={{The VLDB Journal}} 17 4 , year={2008} } @incollection{b8, , title={{EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications}} , author={{ RLu } and { XLiang } and { XLi } and { XLin } and { XShen }} , journal={{IEEE Transactions on Parallel and Distributed Systems}} 23 9 , year={2012} } @incollection{b9, , title={{Calibrating Noise to Sensitivity in Private Data Analysis}} , author={{ CDwork } and { FMcsherry } and { KNissim } and { ASmith }} , booktitle={{Theory of Cryptography Conference}} , year={2006} } @incollection{b10, , title={{Detecting Internet Worms Using Data Mining Techniques}} , author={{ MSiddiqui } and { MCWang } and { JLee }} , journal={{Journal of Systemics, Cybernetics and Informatics}} 6 6 , year={2009} } @incollection{b11, , title={{Top 10 Algorithms in Data Mining}} , author={{ VWu } and { JRKumar } and { JQuinlan } and { QGhosh } and { HYang } and { GJMotoda } and { AMclachlan } and { BNg } and { SYLiu } and { Philip }} , journal={{Knowledge and Information Systems}} 14 1 , year={2008} } @incollection{b12, , title={{Intrusion Detection using a Fuzzy Genetics-Based Learning Algorithm}} , author={{ MSAbadeh } and { JHabibi } and { CLucas }} , journal={{Journal of Network and Computer Applications}} 30 1 , year={2007} } @incollection{b13, , title={{Genetic Algorithm Based Feature Selection Approach for Effective Intrusion Detection System}} , author={{ KSDesale } and { RAde }} , booktitle={{International Conference on Computer Communication and Informatics (ICCCI)}} , year={2015} } @incollection{b14, , title={{Smartphone Malware Detection Model Based on Artificial Immune System}} , author={{ Wu Bin } and { Lu Tianliang } and { ZhengZheng Kangfeng } and { LinDongmei } and { Xing }} , journal={{China Communications}} 11 13 , year={2014} } @incollection{b15, , title={{Dynamic Association Rule Mining using Genetic Algorithms}} , author={{ P Deepa Shenoy } and { K GSrinivasa } and { K RVenugopal } and { L MPatnaik }} , journal={{Intelligent Data Analysis}} 9 5 , year={2005} } @incollection{b16, , title={{Evolutionary Approach for Mining Association Rules on Dynamic Databases}} , author={{ P Deepa Shenoy } and { K GSrinivasa } and { K RVenugopal } and { L MPatnaik }} , booktitle={{7th Pacific-Asia Conference on Knowledge Discovery and Data Mining(PAKDD)}} Seoul, South Korea , year={2003. 2003} } @incollection{b17, , title={{Maintaining Data Privacy in Association Rule Mining}} , author={{ SJRizvi } and { JRHaritsa }} , booktitle={{Proceedings of the 28th International Conference on Very Large Data Bases}} the 28th International Conference on Very Large Data Bases , year={2002} } @incollection{b18, , title={{A Database Sanitizing Algorithm for Hiding Sensitive Multi-level Association Rule mining}} , author={{ SMDarwish } and { MMMadbouly } and { MAEl-Hakeem }} , journal={{International Journal of Computer and Communication Engineering}} 3 4 , year={2014} } @incollection{b19, , title={{Privacy Preserving Association Rule Mining in Vertically Partitioned Data}} , author={{ JVaidya } and { CClifton }} , booktitle={{Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining}} the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining , year={2002} } @incollection{b20, , title={{Secure Set Intersection Cardinality with Application to Association Rule Mining}} , author={{ JVaidya } and { CClifton }} , journal={{Journal of Computer Security}} 13 4 , year={2005} } @incollection{b21, , title={{Efficient Data Mining in SAMS through Association Rule}} , author={{ MR BDiwate } and { ASahu }} , journal={{International Journal of Electronics Communication and Computer Engineering}} 5 3 , year={2014} } @incollection{b22, , title={{MCAR: Multiclass Classification based on Association Rule}} , author={{ FThabtah } and { PCowling } and { YPeng }} , booktitle={{The 3rd ACS/IEEE International Conference on Computer Systems and Applications}} , year={2005} } @book{b23, , title={{International Workshop on Rough Sets, Fuzzy Sets, Data Mining, and Granular-Soft Computing}} , author={{ KHu } and { YLu } and { LZhou } and { CShi }} , year={1999} , note={Integrating Classification and Association Rule Mining: A Concept Lattice Framework} } @incollection{b24, , title={{Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Database}} , author={{ MHussein } and { AEl-Sisi } and { NIsmail }} , booktitle={{International Conference on Knowledge-Based and Intelligent Information and Engineering Systems}} , year={2008} } @incollection{b25, , title={{Privacy-Preserving Collaborative Association Rule Mining}} , author={{ JZhan } and { SMatwin } and { LChang }} , booktitle={{IFIP Annual Conference on Data and Applications Security and Privacy}} , year={2005} } @incollection{b26, , title={{Privacy-Preserving Mining of Association Rules from Outsourced Transaction Databases}} , author={{ FGiannotti } and { LVLakshmanan } and { AMonreale } and { DPedreschi } and { HWang }} , journal={{IEEE Systems Journal}} 7 3 , year={2013} } @incollection{b27, , title={{State Transition Analysis: A Rule-Based Intrusion Detection Approach}} , author={{ KIlgun } and { RAKemmerer } and { PAPorras }} , journal={{IEEE Transactions on Software Engineering}} 21 3 , year={1995} } @incollection{b28, , title={{K-Means Clustering Approach to Analyze NSL-KDD Intrusion Detection Dataset}} , author={{ VKumar } and { HChauhan } and { DPanwar }} , journal={{International Journal of Soft Computing and Engineering (IJSCE)}} 3 4 , year={2013} } @book{b29, , title={{Data Mining with Semantic Features Represented as Vectors of Semantic Clusters}} , author={{ MTaylor }} , year={2012} , publisher={Springer-Verlag} } @incollection{b30, , title={{Situating Anonymization within a Privacy Risk Model}} , author={{ SSShapiro }} , booktitle={{2012 IEEE International Systems Conference(SysCon)}} , year={2012} } @incollection{b31, , title={{Protocols for Secure Computations}} , author={{ ACYao }} , booktitle={{23rd Annual Symposium on Foundations of Computer Science, 1982. SFCS'08}} , year={1982} } @incollection{b32, , title={{FairplayMP: A System for Secure Multi-Party Computation}} , author={{ ABen-David } and { NNisan } and { BPinkas }} , booktitle={{Proceedings of the 15th ACM Conference on Computer and Communications Security}} the 15th ACM Conference on Computer and Communications Security , year={2008} } @incollection{b33, , title={{GUPT: Privacy Preserving Data Analysis made Easy}} , author={{ PMohan } and { AThakurta } and { EShi } and { DSong } and { DCuller }} , booktitle={{Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data}} the 2012 ACM SIGMOD International Conference on Management of Data , year={2012} } @incollection{b34, , title={{Privacy preserving Data Mining within Anonymous Credential Systems}} , author={{ AKiayias } and { SXu } and { MYung }} , booktitle={{International Conference on Security and Cryptography for Networks}} , year={2008} } @incollection{b35, , title={{Privacy Preserving Data Sharing with Anonymous ID Assignment}} , author={{ LADunning } and { RKresman }} , journal={{IEEE Transactions on Information Forensics and Security}} 8 2 , year={2013} } @incollection{b36, , title={{Privacy-Preserving Data Mining in Homogeneous Collaborative Clustering}} , author={{ MOuda } and { SSalem } and { IAli } and { E.-SSaad }} , journal={{International Arab Journal of Information Technology (IAJIT)}} 12 6 , year={2015} } @incollection{b37, , title={{Privacy-Preserving Data Mining: Why, How, and When}} , author={{ JVaidya } and { CClifton }} , journal={{IEEE Security & Privacy}} 2 6 , year={2004} } @incollection{b38, , title={{Cryptographic Techniques for Privacy-Preserving Data Mining}} , author={{ BPinkas }} , journal={{ACM SIGKDD Explorations Newsletter}} 4 2 , year={2002} } @incollection{b39, , title={{Privacy-Preserving Performance Measurements}} , author={{ MRoughan } and { YZhang }} , booktitle={{Proceedings of the 2006 SIGCOMM Workshop on Mining Network Data}} the 2006 SIGCOMM Workshop on Mining Network Data , year={2006} } @incollection{b40, , title={{Using Randomized Response Techniques for Privacy-Preserving Data Mining}} , author={{ WDu } and { ZZhan }} , booktitle={{Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining}} the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining , year={2003} } @incollection{b41, , title={{Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data}} , author={{ MKantarcioglu } and { CClifton }} , journal={{IEEE Transactions on Knowledge and Data Engineering}} 16 9 , year={2004} } @incollection{b42, , title={{Privacy-Preserving Collaborative Data Mining}} , author={{ JZhan }} , journal={{IEEE Computational Intelligence Magazine}} 3 2 , year={2008} } @incollection{b43, , title={{Hide and Share: Landmark-Based Similarity for Private KNN Computation}} , author={{ DFrey } and { RGuerraoui } and { AKermarrec } and { ARault } and { Franc¸oisTa¨?ani } and { JWang }} , booktitle={{Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks}} the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks , year={2015} } @incollection{b44, , title={{Correlated Differential Privacy: Hiding Information in Non-IID Data Set}} , author={{ TZhu } and { PXiong } and { GLi } and { WZhou }} , journal={{IEEE Transactions on Information Forensics and Security}} 10 2 , year={2015} } @incollection{b45, , title={{K-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data}} , author={{ Bk } and { YSamanthula } and { WElmehdwi } and { Jiang }} , journal={{IEEE Transactions on Knowledge and Data Engineering}} 27 5 , year={2015} } @incollection{b46, , title={{CBTS: Correlation Based Transformation Strategy for Privacy Preserving Data Mining}} , author={{ N P Nethravathi } and { GPrashanth } and { DeepaRao } and { Shenoy } and { K RVenugopal } and { MIndramma }} , booktitle={{2015 IEEE International WIE Conference on Electrical and Computer Engineering}} Dhaka, Bangladesh , year={2015} WIECON-ECE } @incollection{b47, , title={{Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data}} , author={{ NMohammed } and { DAlhadidi } and { BFung } and { MDebbabi }} , journal={{IEEE Transactions on Dependable and Secure Computing}} 11 1 , year={2014} } @incollection{b48, , title={{A Random Decision Tree Framework for Privacy-Preserving Data Mining}} , author={{ JVaidya } and { BShafiq } and { WFan } and { DMehmood } and { DLorenzi }} , journal={{IEEE Transactions on Dependable and Secure Computing}} 11 5 , year={2014} } @incollection{b49, , title={{Privacy-preserving Data Mining for Personalized Marketing}} , author={{ Yj } and { Lee }} , journal={{International Journal of Computer Communications and Networks (IJCCN)}} 4 1 , year={2014} } @incollection{b50, , title={{Distributed Data Mining with Differential Privacy}} , author={{ NZhang } and { MLi } and { WLou }} , booktitle={{IEEE International Conference on Communications}} , year={2011} } @incollection{b51, , title={{Differentially Private Recommender Systems: Building Privacy Into the Net}} , author={{ FMcsherry } and { IMironov }} , booktitle={{Proceedings of the 15 th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining}} the 15 th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining , year={2009} } @incollection{b52, , title={{Data Mining with Differential Privacy}} , author={{ AFriedman } and { ASchuster }} , booktitle={{Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining}} the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining , year={2010} } @incollection{b53, , title={{Secure Distributed Data Mining and Its Application to Large Scale Network Measurements}} , author={{ MRoughan } and { YZhang }} , journal={{ACM SIGCOMM Computer Communication Review}} 36 1 , year={2006} } @incollection{b54, , title={{A Brief Survey on Privacy Preserving Data Mining Techniques}} , author={{ N P Nethravathi } and { JVaibhav } and { DeepaDesai } and { MShenoy } and { Indiramma } and { K RVenugopal }} , journal={{Data Mining and Knowledge Engineering}} 8 9 , year={2016} } @incollection{b55, , title={{De-Anonymizing Social Networks}} , author={{ ANarayanan } and { VShmatikov }} , booktitle={{IEEE Symposium on Security and Privacy}} , year={2009} } @incollection{b56, , title={{Survey Paper on Intrusion Detection Using Data Mining Techniques}} , author={{ SChourse } and { VRichhariya }} , journal={{International Journal of Emerging Technology and Advanced Engineering, ISO}} 4 8 , year={2008} } @incollection{b57, , title={{A Software Architecture to Support Misuse Intrusion Detection}} , author={{ SKumar } and { EHSpafford }} , journal={{Computer Science Technical Report}} , year={1995} Purdue University } @book{b58, , title={{State of the Practice of Intrusion Detection Technologies}} , author={{ JAllen } and { AChristie } and { WFithen } and { JMchugh } and { JPickel }} , year={2000} , note={Technical Report} } @incollection{b59, , title={{Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications}} , author={{ RMitchell } and { Chen }} , journal={{IEEE Transactions on Systems, Man, and Cybernetics: Systems}} 44 5 , year={2014} } @incollection{b60, , title={{Intrusion Detection System: Time Probability Method and Hyperbolic Hopfield Neural Network}} , author={{ JJabez } and { BMuthukumar }} , journal={{Journal of Theoretical & Applied Information Technology}} 67 1 , year={2014} } @incollection{b61, , title={{A Study of Intrusion Detection in Data Mining}} , author={{ EKReddy } and { MIaeng } and { VReddy } and { Rajulu }} , journal={{World Congress on Engineering}} , year={2011} } @incollection{b62, , title={{A Data Mining Framework for Building Intrusion Detection Models}} , author={{ WLee } and { SJStolfo } and { KWMok }} , booktitle={{Proceedings of the 1999 IEEE Symposium on Security and Privacy}} the 1999 IEEE Symposium on Security and Privacy , year={1999} } @incollection{b63, , title={{A Detail Analysis on Intrusion Detection Datasets}} , author={{ SKSahu } and { SSarangi } and { SKJena }} , booktitle={{IEEE International on Advance Computing Conference(IACC)}} , year={2014} } @incollection{b64, , title={{A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures}} , author={{ AAC´ardenas } and { RBerthier } and { RBBobba } and { JHHuh } and { JGJetcheva } and { DGrochocki } and { WHSanders }} , journal={{IEEE Transactions on Smart Grid}} 5 2 , year={2014} } @incollection{b65, , title={{Multi-Level Intrusion Detection System}} , author={{ YAl-Nashif } and { AAKumar } and { SHariri } and { YLuo } and { FSzidarovsky } and { GQu }} , booktitle={{International Conference on Autonomic Computing ICAC'08}} , year={2008} } @incollection{b66, , title={{The Round Complexity of Secure Protocols}} , author={{ DBeaver } and { SMicali } and { PRogaway }} , booktitle={{Proceedings of the 22nd Annual ACM Symposium on Theory of Computing}} the 22nd Annual ACM Symposium on Theory of Computing , year={1990} } @incollection{b67, , title={{Detecting New Forms of Network Intrusion Using Genetic Programming}} , author={{ WLu } and { ITraore }} , journal={{Computational Intelligence}} 20 3 , year={2004} } @book{b68, , title={{A Real-Time Intrusion-Detection Expert System (IDES)}} , author={{ TFLunt } and { ATamaru } and { FGillham }} , year={1992} , note={Technical Report} } @incollection{b69, , title={{ADAM: Detecting Intrusions by Data Mining}} , author={{ DBarbara } and { JCouto } and { SJajodia } and { LPopyack } and { NWu }} , booktitle={{Proceedings of the IEEE Workshop on Information Assurance and Security}} the IEEE Workshop on Information Assurance and Security , year={2001} } @incollection{b70, , title={{Data Mining Techniques for Real Time Intrusion Detection Systems}} , author={{ MShetty } and { NShekokar }} , journal={{International Journal of Scientific & Engineering Research}} 3 4 , year={2012} } @incollection{b71, , title={{Adaptive Intrusion Detection: A Data Mining Approach}} , author={{ WLee } and { SJStolfo } and { KWMok }} , journal={{Artificial Intelligence Review}} 14 6 , year={2000} } @book{b72, , title={{Data Mining for Network Intrusion Detection: How to Get Started}} , author={{ EBloedorn } and { ADChristiansen } and { WHill } and { CSkorupka } and { LMTalbot } and { JTivel }} , year={2001} , note={MITRE} } @book{b73, , title={{A Framework for Distributed Intrusion Detection using Interest Driven Cooperating Agents}} , author={{ RGopalakrishna } and { EHSpafford }} , year={2001} , note={Technical Report} } @incollection{b74, , title={{Network Intrusion Detection}} , author={{ BMukherjee } and { LTHeberlein } and { KNLevitt }} , journal={{IEEE Network}} 8 3 , year={1994} } @book{b75, , title={{The Architecture of a Network Level Intrusion Detection System}} , author={{ RHeady } and { GFLuger } and { AMaccabe } and { MServilla }} University of New Mexico , note={Academic Work submitted to the} } @incollection{b76, , title={{Detecting Novel Network Intrusions using Bayes Estimators}} , author={{ DBarbara } and { NWu } and { SJajodia }} , booktitle={{SDM}} , year={2001} } @incollection{b77, , title={{SNORT: Lightweight Intrusion Detection for Networks}} , author={{ MRoesch }} , booktitle={{Proceedings of LISA '99: 13th Systems Administration Conference}} LISA '99: 13th Systems Administration Conference , year={1999} } @incollection{b78, , title={{Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems}} , author={{ RMitchell } and { RChen }} , journal={{IEEE Transactions on Reliability}} 62 1 , year={2013} } @incollection{b79, , title={{Host-Based Intrusion Detection Using Dynamic and Static Behavioral Models}} , author={{ D.-YYeung } and { YDing }} , journal={{Pattern Recognition}} 36 1 , year={2003} } @incollection{b80, , title={{Mining Audit Data to Build Intrusion Detection Models}} , author={{ WLee } and { SJStolfo } and { KWMok }} , booktitle={{KDD-98 Proceedings}} , year={1998} } @incollection{b81, , title={{Differential Packet Filtering Against DDos Flood Attacks}} , author={{ STanachaiwiwat } and { KHwang }} , booktitle={{ACM Conference on Computer and Communications Security (CCS)}} , year={2003} } @incollection{b82, , title={{A Specification-Based Intrusion Detection System forAODV}} , author={{ C.-YTseng } and { PBalasubramanyam } and { CKo } and { RLimprasittiporn } and { JRowe } and { KLevitt }} , booktitle={{Proceedings of the 1st ACM Workshop on Security of Ad-hoc and Sensor Networks}} the 1st ACM Workshop on Security of Ad-hoc and Sensor Networks , year={2003} } @incollection{b83, , title={{The Practical Data Mining Model for Efficient IDS Through Relational Databases}} , author={{ MSVittapu } and { VSunkari } and { AYAbate }} , journal={{International Journal of Research in Engineering and Science}} 3 1 , year={2015} } @incollection{b84, , title={{An Intrusion Detection System Based on Data Using Data Mining Techniques and Feature Selection}} , author={{ PSoni } and { PSharma }} , journal={{International Journal of Soft Computing and Engineering (IJSCE)}} 4 , year={2014} } @incollection{b85, , title={{Faster Tree Pattern Matching}} , author={{ MDubiner } and { ZGalil } and { EMagen }} , journal={{Journal of the ACM (JACM)}} 41 2 , year={1994} } @incollection{b86, , title={{Intrusion Detection by Machine Learning: A Review}} , author={{ C.-FTsai } and { Y.-FHsu } and { C.-Y.Lin } and { W.-YLin }} , journal={{Expert Systems with Applications}} 36 10 0 , year={2009} } @book{b87, , title={{Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection}} , author={{ DMFarid } and { NHarbi } and { MZRahman }} arXiv:1005.4496 , year={2010} , note={arXiv preprint} } @incollection{b88, , title={{A Tutorial on Support Vector Regression}} , author={{ AJSmola } and { BSch¨olkopf }} , journal={{Statistics and Computing}} 14 3 , year={2004} } @incollection{b89, , title={{Text Categorization with Support Vector Machines: Learning With Many Relevant Features}} , author={{ TJoachims }} , booktitle={{European Conference on Machine Learning}} , year={1998} } @incollection{b90, , title={{An Adaptive Network Intrusion Detection Method Based on PCA and Support Vector Machines}} , author={{ XXu } and { XWang }} , booktitle={{International Conference on Advanced Data Mining and Applications}} , year={2005} } @incollection{b91, , title={{PFU: Profiling Forum Users in Online Social Networks, A Knowledge Driven Data Mining Approach}} , author={{ G UVasanthakumar } and { DeepaShenoy } and { K RVenugopal } and { L MPatnaik }} , booktitle={{2015 IEEE International WIE Conference on Electrical and Computer Engineering (WIECONECE)}} , year={2015} } @book{b92, , title={{Trustbar: Protecting (even naive) Web Users from Spoofing and Phishing Attacks}} , author={{ AHerzberg } and { AGbara }} 2004/155 , year={2004/155, 2004} , note={Cryptology ePrint Archive Report} } @incollection{b93, , title={{Intelligent Rule-Based Phishing Websites Classification}} , author={{ RMMohammad } and { FThabtah } and { LMccluskey }} , journal={{IET Information Security}} 8 3 , year={2014} } @incollection{b94, , title={{PhishStorm:Detecting Phishing with Streaming Analytics}} , author={{ SMarchal } and { JFranc¸ois } and { RState } and { TEngel }} , journal={{IEEE Transactions on Network and Service Management}} 11 4 , year={2014} } @incollection{b95, , title={{Phishing Detection Based Associative Classification Data Mining}} , author={{ NAbdelhamid } and { AAyesh } and { FThabtah }} , journal={{Expert Systems with Applications}} 41 13 , year={2014} } @book{b96, , title={{Academic Work Submitted to School of Computer Science at Research Showcase , CMU}} , author={{ YZhang } and { SEgelman } and { LCranor } and { JHong }} , note={Phinding Phish: Evaluating Anti-Phishing Tools} } @incollection{b97, , title={{Predicting Phishing Websites using Classification Mining Techniques with experimental Case Studies}} , author={{ MAburrous } and { MAHossain } and { KDahal } and { FThabtah }} , booktitle={{Seventh International Conference on Information Technology: New Generations (ITNG)}} , year={2010} } @incollection{b98, , title={{Online Detection and Prevention of Phishing Attacks}} , author={{ JChen } and { CGuo }} , booktitle={{First International Conference on Communications and Networking in China}} , year={2006} } @incollection{b99, , title={{Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (emd)}} , author={{ AYFu } and { LWenyin } and { XDeng }} , journal={{IEEE Transactions on Dependable and Secure Computing}} 3 4 , year={2006} } @book{b100, , title={{An Empirical Analysis of the Current State of Phishing Attack and Defence}} , author={{ TMoore } and { RClayton }} , year={2007} , note={Academic work} } @incollection{b101, , title={{The State of Phishing Attacks}} , author={{ JHong }} , journal={{Communications of the ACM}} 55 1 , year={2012} } @incollection{b102, , title={{Detection of Fraudulent and Malicious Websites by Analysing User Reviews for Online Shopping Websites}} , author={{ DeepaAsha S Manek } and { ChandraShenoy } and { Mohan } and { K RVenugopal }} , journal={{International Journal of Knowledge and Web Intelligence}} 5 3 , year={2016} } @incollection{b103, , title={{An Evaluation of Extended Validation and Picturein-Picture Phishing attacks}} , author={{ CJackson } and { DRSimon } and { DSTan } and { ABarth }} , booktitle={{International Conference on Financial Cryptography and Data Security}} , year={2007} } @incollection{b104, , title={{}} , author={{ CCortes } and { XGonzalvo } and { VKuznetsov } and { MMohri } and { SYang }} arXiv:1607.01097v1 , journal={{AdaNet: Adaptive Structural Learning of Artificial Neural Networks}} 1 17 , year={2016} } @book{b105, , title={{Spatial Prediction Models for Shallow Landslide Hazards: A Comparative Assessment of the Efficacy of Support Vector Machines, Artificial Neural Networks, Kernel Logistic Regression, and Logistic Model Tree}} , author={{ DBui } and { TTuan } and { HKlempe } and { BPradhan } and { IRevhaug }} , year={2015} , publisher={springer-Verlag} 13 , address={Berlin Heidelberg} } @incollection{b106, , title={{Effectively Generating Frequent Episode Rules for Anomaly-based Intrusion Detection}} , author={{ MQin } and { KHwang }} , booktitle={{IEEE Symposium on Security and Privacy}} , year={2003} } @incollection{b107, , title={{A Framework for Periodic Outlier Pattern Detection in Time-Series Sequences}} , author={{ RRasheed } and { Alhajj }} , journal={{IEEE Transactions on Cybernetics}} 44 5 , year={2014} } @incollection{b108, , title={{Netshield: Protocol Anomaly Detection with Datamining against DDOS Attacks}} , author={{ KHwang } and { PDave } and { STanachaiwiwat }} , booktitle={{Proceedings of the 6th International Symposium on Recent Advances in Intrusion Detection}} the 6th International Symposium on Recent Advances in Intrusion DetectionPittsburgh, PA , year={2003} } @incollection{b109, , title={{A Collaborative Intrusion Detection Mechanism Against False Data Injection Attack in Advanced Metering Infrastructure}} , author={{ XLiu } and { PZhu } and { YZhang } and { KChen }} , journal={{IEEE Transactions on Smart Grid}} 6 5 , year={2015} } @incollection{b110, , title={{Data Mining Methods for Detection of New Malicious Executables}} , author={{ MGSchultz } and { EEskin } and { FZadok } and { SJStolfo }} , booktitle={{Proceedings of IEEE Symposium on Security and Privacy S&P}} IEEE Symposium on Security and Privacy S&P , year={2001} } @incollection{b111, , title={{Smartphone Malware Detection Model Based on Artificial Immune System}} , author={{ BWu } and { TLu } and { KZheng } and { DZhang } and { XLin }} , journal={{China Communications}} 11 13 , year={2015} } @incollection{b112, , title={{Implementnig Data Mining for Detection of Malware from Code}} , author={{ DK BPatel } and { SHBhatt }} , journal={{An International Journal of Advanced Computer Technology:Compusoft}} 3 4 , year={2014} } @incollection{b113, , title={{ROPMEMU: A Framework for the Analysis of Complex Code-Reuse Attacks}} , author={{ MarianoGraziano } and { DavideBalzarotti } and { AlainZidouemba }} , booktitle={{11th ACM Asia Conference on Computer and Communications Security}} , year={2016} } @incollection{b114, , title={{How to Train Your Browser: Preventing XSS Attacks Using Contextual Script Fingerprints}} , author={{ DMitropoulos } and { KStroggylos } and { DSpinellis }} , journal={{ACM Transactions on Privacy and Security}} 19 1 , year={2016} } @incollection{b115, , title={{ROPocop -Dynamic Mitigation of Code-Reuse Attacks}} , author={{ EFollner } and { Bodden }} , journal={{Secure Software Engineering Group}} 29 3 , year={2015} } @incollection{b116, , title={{Exception-Oriented Programming: Retrofitting Code-Reuse Attacks to Construct Kernel Malware}} , author={{ GParmar } and { Dr. KirtiMathur } and { ;LDeng } and { QZeng }} , journal={{The Institution of Engineering and Technology}} 5 5 , year={2015. 2016} , note={Indian Journal of Applied Research} } @book{b117, , title={{XSS-SAFE:A Server-Side Approach to Detect and Mitigate Cross-Site Scripting (XSS) Attacks in JavaScript Code}} , author={{ SGupta } and { BBGupta }} , year={2015} , publisher={Springer} 4 } @book{b118, , title={{Generic Detection of Code Injection Attacks using Network-Level Emulation}} , author={{ MPolychronakis }} , year={2009} , note={Ph.D. Thesis} } @incollection{b119, , title={{A Formal Proof of Countermeasures Against Fault Injection Attacks on CRT-RSA}} , author={{ PRauzy } and { SGuilley }} , journal={{Journal of Cryptographic Engineering}} 4 3 , year={2014} } @incollection{b120, , title={{Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits}} , author={{ SBhatkar } and { DCDuvarney } and { RSekar }} , journal={{Usenix Security}} 3 , year={2003} } @incollection{b121, , title={{Randomized Instruction Set Emulation to Disrupt Binary Code Injection Attacks}} , author={{ EGBarrantes } and { DHAckley } and { TSPalmer } and { DStefanovic } and { DDZovi }} , booktitle={{Proceedings of the 10th ACM Conference on Computer and Communications Security}} the 10th ACM Conference on Computer and Communications Security , year={2003} } @incollection{b122, , title={{Efficient Techniques for Comprehensive Protection from Memory Error Exploits}} , author={{ SBhatkar } and { DCDuvarney } and { RSekar }} , booktitle={{Proceedings of the 14th USENIX Security Symposium}} the 14th USENIX Security Symposium , year={2005} } @incollection{b123, , title={{Mastering C++}} , author={{ K RVenugopal } and { RajkumarBuyya }} , journal={{Tata McGraw-Hill Education}} , year={2013} } @incollection{b124, , title={{DISARM: Mitigating Buffer Overflow Attacks on Embedded Devices}} , author={{ JHabibi } and { APanicker } and { AGupta } and { EBertino }} , booktitle={{International Conference on Network and System Security}} , year={2015} } @incollection{b125, , title={{Signature-Based Protection from Code Reuse Attacks}} , author={{ MKayaalp } and { TSchmitt } and { JNomani } and { DPonomarev } and { NAGhazaleh }} , journal={{IEEE Transactions on Computers}} 64 2 , year={2015} } @incollection{b126, , title={{Size Does Matter:Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard}} , author={{ EG¨oktas¸ } and { EAthanasopoulos } and { MPolychronakis } and { HBos } and { GPortokalidis }} , booktitle={{USENIX Security Symposium}} , year={2014} } @incollection{b127, , title={{Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space L]ayout Randomization}} , author={{ SKevin } and { Z } and { FMonrose } and { DFabian } and { DLucas } and { LAlexandra } and { SChristopher } and { RAhmad }} , booktitle={{2013 IEEE Symposium on Security and Privacy}} , year={2013} } @incollection{b128, , title={{A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level}} , author={{ VVan Der Veen } and { EG¨oktas } and { MContag } and { APawlowski } and { XChen } and { SRawat } and { HBos } and { THolz } and { EAthanasopoulos } and { CGiuffrida }} , booktitle={{IEEE Symposium on Security and Privacy}} , year={2016} } @incollection{b129, , title={{Detecting Code Reuse Attacks with a Model of Conformant Program Execution}} , author={{ ERJacobson } and { ARBernat } and { WRWilliams } and { BPMiller }} , booktitle={{International Symposium on Engineering Secure Software and Systems}} , year={2014} } @incollection{b130, , title={{CMC: A Pragmatic Approach to Model Checking Real Code}} , author={{ MMusuvathi } and { DYPark } and { AChou } and { DREngler } and { DLDill }} , journal={{ACM SIGOPS Operating Systems Review}} 36 5 , year={2002} } @book{b131, , title={{Prediction and Pan Code Reuse Attack by Code Randomization Mechanism and Data Corruption}} , author={{ NMohanappriya } and { R }} , year={2016} , note={Techniques and Algorithms in Emerging Technologies} } @incollection{b132, , title={{}} , author={{ DMStanley }} , journal={{CERIAS Tech Report}} , year={2013-19} } @book{b133, , title={{Improved Kernel Security through Code Validation, Diversification, and Minimization}} , year={2013} , note={Ph.D. Thesis} } @incollection{b134, , title={{Runtime Code Reuse Attacks: A Dynamic Framework Bypassing Fine-Grained Address Space Layout Randomization}} , author={{ YZhuang } and { TZheng } and { ZLin }} , journal={{SEKE}} , year={2014} } @incollection{b135, , title={{Surgically Returning to Randomized Lib (C)}} , author={{ GFRoglia } and { LMartignoni } and { RPaleari } and { DBruschi }} , booktitle={{Computer Security Applications Conference}} , year={2009} } @incollection{b136, , title={{When Good Instructions Go Bad: Generalizing Return-Oriented Programming to RISC}} , author={{ EBuchanan } and { RRoemer } and { HShacham } and { SSavage }} , booktitle={{Proceedings of the 15th ACM Conference on Computer and Communi-cations Security}} the 15th ACM Conference on Computer and Communi-cations Security , year={2008} } @incollection{b137, , title={{MARLIN: A Fine Grained Randomization Approach to Defend Against ROP Attacks}} , author={{ AGupta } and { SKerr } and { MSKirkpatrick } and { EBertino }} , booktitle={{International Conference on Network and System Security}} , year={2013} } @book{b138, , title={{}} , author={{ SCheckoway } and { LDavi } and { ADmitrienko } and { A.-R }} } @incollection{b139, , title={{Return-Oriented Programming Without Returns}} , author={{ HSadeghi } and { MShacham } and { Winandy }} , booktitle={{Proceedings of the 17th ACM Conference on Computer and Communications Security}} the 17th ACM Conference on Computer and Communications Security , year={2010} } @incollection{b140, , title={{ROP Defender: A Detection Tool to Defend Against Return-Oriented Programming Attacks}} , author={{ LDavi } and { A.-RSadeghi } and { MWinandy }} , booktitle={{Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security}} the 6th ACM Symposium on Information, Computer and Communications Security , year={2011} } @book{b141, , title={{Return-Oriented Programming Without Returns on ARM}} , author={{ LDavi } and { ADmitrienko } and { A.-RSadeghi } and { MWinandy }} HGI-TR-2010- 002 , year={2010} , note={Technical Report} } @incollection{b142, , title={{Return-Oriented Programming: Systems, languages, and applications}} , author={{ RRoemer } and { EBuchanan } and { HShacham } and { SSavage }} , journal={{ACM Transactions on Information and System Security (TISSEC)}} 15 1 , year={2012} } @incollection{b143, , title={{G-Free: Defeating Return-Oriented Programming Through Gadget-Less Binaries}} , author={{ KOnarlioglu } and { LBilge } and { ALanzi } and { DBalzarotti } and { EKirda }} , booktitle={{Proceedings of the 26th Annual Computer Security Applications Conference}} the 26th Annual Computer Security Applications Conference , year={2010} } @incollection{b144, , title={{Smashing the Gadgets: Hindering Return-Oriented programming using In-Place Code Randomization}} , author={{ VPappas } and { MPolychronakis } and { ADKeromytis }} , booktitle={{2012 IEEE Symposium on Security and Privacy}} , year={2012} } @incollection{b145, , title={{When Good Instructions Go Bad: Generalizing Return-Oriented Programming to RISC}} , author={{ EBuchanan } and { RRoemer } and { HShacham } and { SSavage }} , booktitle={{Proceedings of the 15th ACM Conference on Computer and Communications Security}} the 15th ACM Conference on Computer and Communications Security , year={2008} } @incollection{b146, , title={{Dynamic Integrity Measurement and Attestation: Towards Defense Against Return-Oriented Programming Attacks}} , author={{ LDavi } and { A.-RSadeghi } and { MWinandy }} , booktitle={{Proceedings of the 2009 ACM Workshop on Scalable Trusted Computing}} the 2009 ACM Workshop on Scalable Trusted Computing , year={2009} } @incollection{b147, , title={{Drop:Detecting Return-Oriented Programming Malicious Code}} , author={{ PChen } and { HXiao } and { XShen } and { XYin } and { BMao } and { LXie }} , booktitle={{International Conference on Information Systems Security}} , year={2009} } @incollection{b148, , author={{ FYao } and { JChen } and { GVenkataramani }} , booktitle={{International Conference on Computer Design}} , year={2013} } @incollection{b149, , title={{Jump-Oriented Programming: A New Class of Code-Reuse Attack}} , author={{ TBletsch } and { XJiang } and { VWFreeh } and { ZLiang }} , booktitle={{Proceedings ACM Symposium on Information, Computer and Communications Security}} ACM Symposium on Information, Computer and Communications Security , year={2011} } @incollection{b150, , title={{On The Combination of Genetic Fuzzy Systems and Pairwise Learning for Improving Detection Rates on Intrusion Detection Systems}} , author={{ SAbadeh } and { AFernandez } and { ABawakid } and { SAlshomrani } and { FHerrera }} , journal={{Journal of Expert Systems with Applications}} 42 1 , year={2015} }