Baehrens, D., Schroeter, T., Harmeling, S., Kawanabe, M.,
Hansen, K., and M
¨
uller, K.-R. (2010). How to Ex-
plain Individual Classification Decisions. Journal of
Machine Learning Research, 11:1803–1831.
Baesens, B., Martens, D., Setiono, R., and Zurada, J. M.
(2011). Guest Editorial White Box Nonlinear Predic-
tion Models. IEEE Transactions on Neural Networks,
22(12):2406–2408.
Bondarenko, A., Aleksejeva, L., Jumutc, V., and Borisov, A.
(2017). Classification Tree Extraction from Trained
Artificial Neural Networks. Procedia Computer Sci-
ence, 104:556–563.
Breiman, L. et al. (2001). Statistical modeling: The two cul-
tures (with comments and a rejoinder by the author).
Statistical Science, 16(3):199–231.
Bryant, R. E. (1992). Symbolic Boolean Manipulation with
Ordered Binary Decision Diagrams. ACM Computing
Surveys, 24:293–318.
Cho, K., Van Merri
¨
enboer, B., Gulcehre, C., Bahdanau,
D., Bougares, F., Schwenk, H., and Bengio, Y.
(2014). Learning Phrase Representations using RNN
Encoder-Decoder for Statistical Machine Translation.
In Empirical Methods in Natural Language Process-
ing, page 1724–1734. Association for Computational
Linguistics.
Craven, M. W. and Shavlik, J. W. (1996). Extracting tree-
structured tepresentations of trained networks. In
Advances in Neural Information Processing Systems,
pages 24–30. MIT Press.
Etchells, T. A. and Lisboa, P. J. (2006). Orthogonal search-
based rule extraction (OSRE) for trained neural net-
works: a practical and efficient approach. IEEE trans-
actions on Neural Networks, 17(2):374–384.
Fayyad, U., Piatetsky-Shapiro, G., and Smyth, P.
(1996). From data mining to knowledge discovery in
databases. AI magazine, 17(3):37–37.
Gim
´
enez, C. T., Villegas, A. P., and Mara
˜
n
´
on, G.
´
A. (2010).
HTTP data set CSIC 2010. Information Security In-
stitute of CSIC (Spanish Research National Council).
Gunning, D. (2016). Explainable Artificial Intelligence
(XAI). Technical Report DARPA/I20, Defense Ad-
vanced Research Projects Agency.
He, K., Zhang, X., Ren, S., and Sun, J. (2016). Deep resid-
ual learning for image recognition. In Computer Vi-
sion and Pattern Recognition, pages 770–778. IEEE.
Karnaugh, M. (1953). The map method for synthesis
of combinational logic circuits. Transactions of the
American Institute of Electrical Engineers, Part I:
Communication and Electronics, 72:593–599.
Keedwell, E., Narayanan, A., and Savic, D. (2000). Creat-
ing rules from trained neural networks using genetic
algorithms. Internation Journal of Computers, System
and Signal, 1(1):30–42.
Likarish, P., Jung, E., and Jo, I. (2009). Obfuscated ma-
licious Javascript detection using classification tech-
niques. In Malicious and Unwanted Software (MAL-
WARE), pages 47–54. IEEE.
Mahendran, A. and Vedaldi, A. (2015). Understand-
ing Deep Image Representations by Inverting Them.
In Computer Vision and Pattern Recognition, pages
5188–5196. IEEE.
Manojlovic, V. (2013). Minimization of Switching Func-
tions using Quine-McCluskey Method. International
Journal of Computer Applications, 82(4):12–16.
Martens, D., Baesens, B., and Van Gestel, T. (2009). De-
compositional rule extraction from support vector ma-
chines by active learning. IEEE Transactions on
Knowledge and Data Engineering, 21(2):178–191.
MathWorks (2019). Feature selection. https://uk.
mathworks.com/help/stats/feature-selection.html.
Accessed: 11/3/2019.
Mereani, F. A. and Howe, J. M. (2018a). Detecting Cross-
Site Scripting Attacks Using Machine Learning. In
International Conference on Advanced Technologies
and Applications Intelligent Systems and Computing,
pages 200–210. Springer.
Mereani, F. A. and Howe, J. M. (2018b). Preventing Cross-
Site Scripting Attacks by Combining Classifiers. In
Proceedings of the 10th International Joint Confer-
ence on Computational Intelligence - Volume 1, pages
135–143. SciTePress.
Nadji, Y., Saxena, P., and Song, D. (2009). Document Struc-
ture Integrity: A Robust Basis for Cross-site Scripting
Defense. In Network and Distributed System Security
Symposium. Internet Society.
Nguyen, A., Yosinski, J., and Clune, J. (2016). Multi-
faceted Feature Visualization: Uncovering the Dif-
ferent Types of Features Learned by Each Neu-
ron in Deep Neural Networks. arXiv preprint
arXiv:1602.03616.
OWASP (2017). OWASP Top 10 - 2017 rc1.
https://www.owasp.org. Accessed: 7/6/2017.
Rhode, M., Burnap, P., and Jones, K. (2017). Early
Stage Malware Prediction Using Recurrent Neural
Networks. Computers and Security, 77:578–594.
Rickmann, S. (2012). Logic Friday (version 1.1.4)[com-
puter software]. https://web.archive.org/web/
20131022021257/http://www.sontrak.com/. Ac-
cessed: 24/11/2018.
Rudell, R. L. (1986). Multiple-valued logic minimiza-
tion for PLA synthesis. Technical Report UCB/ERL
M86/65, University of California, Berkeley.
Saito, K. and Nakano, R. (1988). Medical diagnostic ex-
pert system based on PDP model. In Proceedings of
IEEE International Conference on Neural Networks,
volume 1, pages 255–262.
Schwender, H. (2007). Minimization of Boolean Expres-
sions using Matrix Algebra. Technical report, Tech-
nical Report//Sonderforschungsbereich 475, Kom-
plexit
¨
atsreduktion in Multivariaten Datenstrukturen,
Universit
¨
at Dortmund.
Setiono, R. and Liu, H. (1995). Understanding Neural Net-
works via Rule Extraction. In IJCAI, volume 1, pages
480–485.
Setiono, R. and Liu, H. (1997). NeuroLinear: From neural
networks to oblique decision rules. Neurocomputing,
17(1):1–24.
Taha, I. and Ghosh, J. (1996). Three techniques for extract-
ing rules from feedforward networks. In Intelligent
NCTA 2019 - 11th International Conference on Neural Computation Theory and Applications
432