Calling Out To Researchers/Academics
Esteemed researchers/academics,
Spider.io is eager to work closely with you, through joint research, sponsored research, CASE studentships, etc. We currently have close ties to the Department of Computing at Imperial College London, and we are looking to build up relationships with academics/researchers at other institutions. For more information, please get in touch at: research@spider.io.
If curious about our efforts, a sample bibliography is provided below.
Research Bibliography
- A Brief Review of Biometric Identification. Tilo Burghart.
- A k-Nearest Neighbor Approach for User Authentication through Biometric Keystroke Dynamics. Jiankun Hu et al.
- A Large-Scale Hidden Semi-Markov Model for Anomaly Detection on User Browsing Behaviors. Yi Xie et al.
- A Large-scale Study of Automated Web Search Traffic. Greg Buehrer et al.
- A Machine Learning Approach to Keystroke Dynamics Based User Authentication. Kenneth Revett et al.
- A Methodology for Designing Accurate Anomaly Detection Systems. Kenneth Ingham et al.
- A Multi-Layered Approach to Botnet Detection. Robert Erbacher et al.
- A Multi-Model Approach to the Detection of Web-Based Attacks. Christopher Kruegel et al.
- A Nested Hidden Markov Model for Internet Browsing Behavior. Steven Scott et al.
- A New Biometric Technology Based on Mouse Dynamics. Ahmed Ahmed et al.
- A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification. Nigel Williams et al.
- A Survey of Botnet: Consequences, Defenses and Challenges. Yun-Ho Shin et al.
- A Survey of Botnet Technology and Defenses. Michael Bailey et al.
- A Survey of User Authentication Based on Mouse Dynamics. Kenneth Revett et al.
- A Taxonomy of Botnet Structures. David Dagon et al.
- ALADIN: Active Learning of Anomalies to Detect Intrusion. Jack Stokes et al.
- An Evolutionary Keystroke Authentication Based on Ellipsoidal Hypothesis Space. Jae-Wook Lee et al.
- An Identity Authentication System Based On Human Computer Interaction Behaviour. Hugo Gamboa et al.
- Anomaly Detection for HTTP Intrusion Detection: Algorithm Comparisons and the Effect of Generalization on Accuracy. Kenneth Ingham.
- Anomaly Detection of Web-Based Attacks. Christopher Kruegel et al.
- Automatic Detection and Banning of Content Stealing Bots for E-Commerce. Nicolas Poggi et al.
- Behavioural Biometrics: a Survey and Classification. Roman Yampolskiy et al.
- Bot Detection via Mouse Mapping. Evan Winslow.
- BotCop: An Online Botnet Traffic Classifier. Wei Lu et al.
- BotGraph: Large Scale Spamming Botnet Detection. Yao Zhao et al.
- Botnet Traffic Detection Techniques by C&C Session Classification Using SVM. Satoshi Kondo et al.
- BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic. Guofei Gu et al.
- Comparing Anomaly Detection Techniques for HTTP. Kenneth Ingham et al.
- Computational Forensics for Botnet Analyzation and Botnet Attack Mitigation. Anders Flaglien.
- Detecting Botnets Using Hidden Markov Models on Network Traces. Wade Gobel.
- Direct and Indirect Human Computer Interaction Based Biometrics. Roman Yampolskiy et al.
- Discovery of Web Robot Sessions based on Navigational Patterns. Pan-Ning Tan et al.
- Enhanced User Authentication Through Keystroke Biometrics. Edmond Lau et al.
- HMM-Web: a Framework for the Detection of Attacks against Web Applications. Igino Corona et al.
- How Dynamic are IP Addresses? Yinglian Xie et al.
- Identity Theft, Computers and Behavioral Biometrics. Robert Moskovitch et al.
- Implicit CAPTCHAs. Henry Bairda et al.
- Internet Traffic Classification Demystified: Myths, Caveats, and the Best Practices. Hyunchul Kim et al.
- Intrusion Detection with Neural Networks. Jake Ryan et al.
- Inverse Biometrics for Mouse Dynamics. Akif Nazar et al.
- Keystroke Analysis of Different Languages: A Case Study. Daniele Gunetti et al.
- Keystroke Dynamics. Jarmo Ilonen.
- Keystroke Statistical Learning Model for Web Authentication. Cheng-Huang Jiang et al.
- Learning User Keystroke Patterns for Authentication. Ying Zhao.
- McPAD : A Multiple Classifier System for Accurate Payload-based Anomaly Detection. Roberto Perdisci et al.
- McPAD and HMM-Web: Two Different Approaches for the Detection of Attacks against Web Applications. Davide Ariu et al.
- Modeling of Web Robot Navigational Patterns. Pang-Ning Tan et al.
- Not-a-Bot: Improving Service Availability in the Face of Botnet Attacks. Ramakrishna Gummadi et al.
- Offline/Realtime Traffic Classification Using Semi-Supervised Learning. Jeffrey Erman et al.
- On the Validation of Traffic Classification Algorithms. Geza Szabo et al.
- On Using Mouse Movements as a Biometric. Shivani Hashia et al.
- Periodic Behavior in Botnet Command and Control Channels Traffic. Basil AsSadhan et al.
- Prevention or Identification of Web Intrusion via Human Computer Interaction Behaviour – A Proposal. Hugo Gamboa et al.
- Proactive Intrusion Detection. Benjamin Liebald, Dan Roth et al.
- SBotMiner: Large Scale Search Bot Detection. Fang Yu et al.
- Securing Web Service by Automatic Robot Detection. KyoungSoo Park et al.
- Spamming Botnets: Signatures and Characteristics. Yinglian Xie et al.
- Support Vector Machines for TCP Traffic Classification. Alice Este et al.
- Towards a Taxonomy of Intrusion-Detection Systems. Herve Debar et al.
- Towards Behaviometric Security Systems: Learning to Identify a Typist. Mordechai Nisenson et al.
- Traffic Classification – Towards Accurate Real Time Network Applications. Zhu Li et al.
- Typing Patterns: A Key to User Identification. Alen Peacock et al.
- User Authentication through Keystroke Dynamics. Francesco Bergadano et al.
- User Re-Authentication via Mouse Movements. Maja Pusara et al.
- Web based Keystroke Dynamics Identity Verification using Neural Network. Sungzoon Cho et al.
- Web Robot Detection techniques: Overview and Limitations. Derek Doran et al.
- Web Robot Detection: a Probabilistic Reasoning Approach. Athena Stassopoulou et al.
- Web Tap: Detecting Covert Web Traffic. Kevin Borders et al.
- WEBBIOMETRICS: User Verification via Web Interaction. Hugo Gamboa et al.
- What’s in a Session: Tracking Individual Behavior on the Web. Mark Meiss et al.
- WIDAM – Web Interaction Display and Monitoring. Hugo Gamboa et al.