Hunting Malicious TLS Certificates with Deep Neural Networks.
Ivan TorroledoLuis David CamachoAlejandro Correa BahnsenPublished in: AISec@CCS (2018)
Keyphrases
- neural network
- artificial neural networks
- pattern recognition
- back propagation
- malicious attacks
- fuzzy logic
- access control
- genetic algorithm
- malicious behavior
- malicious users
- fuzzy neural network
- self organizing maps
- parameter estimation
- network architecture
- neural nets
- public key
- deep learning
- multilayer perceptron