• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4603666)   Today's Articles (1402)   Subscriber (49370)
For: García S, Grill M, Stiborek J, Zunino A. An empirical comparison of botnet detection methods. Comput Secur 2014. [DOI: 10.1016/j.cose.2014.05.011] [Citation(s) in RCA: 198] [Impact Index Per Article: 19.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
Number Cited by Other Article(s)
51
When 5G Meets Deep Learning: A Systematic Review. ALGORITHMS 2020. [DOI: 10.3390/a13090208] [Citation(s) in RCA: 17] [Impact Index Per Article: 4.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
52
Fourati H, Maaloul R, Chaari L. A survey of 5G network systems: challenges and machine learning approaches. INT J MACH LEARN CYB 2020. [DOI: 10.1007/s13042-020-01178-4] [Citation(s) in RCA: 36] [Impact Index Per Article: 9.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
53
Apruzzese G, Andreolini M, Colajanni M, Marchetti M. Hardening Random Forest Cyber Detectors Against Adversarial Attacks. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE 2020. [DOI: 10.1109/tetci.2019.2961157] [Citation(s) in RCA: 16] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/08/2022]
54
Yan J, Shi L, Tao J, Yu X, Zhuang Z, Huang C, Yu R, Su P, Wang C, Chen Y. Visual Analysis of Collective Anomalies Using Faceted High-Order Correlation Graphs. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 2020;26:2517-2534. [PMID: 30582546 DOI: 10.1109/tvcg.2018.2889470] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/09/2023]
55
A graph neural network method for distributed anomaly detection in IoT. EVOLVING SYSTEMS 2020. [DOI: 10.1007/s12530-020-09347-0] [Citation(s) in RCA: 10] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
56
Developing a Robust Defensive System against Adversarial Examples Using Generative Adversarial Networks. BIG DATA AND COGNITIVE COMPUTING 2020. [DOI: 10.3390/bdcc4020011] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
57
Shi WC, Sun HM. DeepBot: a time-based botnet detection with deep learning. Soft comput 2020. [DOI: 10.1007/s00500-020-04963-z] [Citation(s) in RCA: 17] [Impact Index Per Article: 4.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
58
Zago M, Gil Pérez M, Martínez Pérez G. UMUDGA: A dataset for profiling DGA-based botnet. Comput Secur 2020. [DOI: 10.1016/j.cose.2020.101719] [Citation(s) in RCA: 21] [Impact Index Per Article: 5.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
59
AppCon: Mitigating Evasion Attacks to ML Cyber Detectors. Symmetry (Basel) 2020. [DOI: 10.3390/sym12040653] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
60
Towards a Reliable Comparison and Evaluation of Network Intrusion Detection Systems Based on Machine Learning Approaches. APPLIED SCIENCES-BASEL 2020. [DOI: 10.3390/app10051775] [Citation(s) in RCA: 14] [Impact Index Per Article: 3.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/26/2022]
61
Daya AA, Salahuddin MA, Limam N, Boutaba R. BotChase: Graph-Based Bot Detection Using Machine Learning. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT 2020. [DOI: 10.1109/tnsm.2020.2972405] [Citation(s) in RCA: 18] [Impact Index Per Article: 4.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/06/2022]
62
Ferrag MA, Maglaras L, Moschoyiannis S, Janicke H. Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2020. [DOI: 10.1016/j.jisa.2019.102419] [Citation(s) in RCA: 97] [Impact Index Per Article: 24.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/05/2023]
63
A survey of network-based intrusion detection data sets. Comput Secur 2019. [DOI: 10.1016/j.cose.2019.06.005] [Citation(s) in RCA: 255] [Impact Index Per Article: 51.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/14/2023]
64
Cao VL, Nicolau M, McDermott J. Learning Neural Representations for Network Anomaly Detection. IEEE TRANSACTIONS ON CYBERNETICS 2019;49:3074-3087. [PMID: 29994493 DOI: 10.1109/tcyb.2018.2838668] [Citation(s) in RCA: 21] [Impact Index Per Article: 4.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/08/2023]
65
Minimum distance histograms with universal performance guarantees. JAPANESE JOURNAL OF STATISTICS AND DATA SCIENCE 2019. [DOI: 10.1007/s42081-019-00054-y] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/26/2022]
66
An Adaptive Multi-Layer Botnet Detection Technique Using Machine Learning Classifiers. APPLIED SCIENCES-BASEL 2019. [DOI: 10.3390/app9112375] [Citation(s) in RCA: 58] [Impact Index Per Article: 11.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
67
Flow-based network traffic generation using Generative Adversarial Networks. Comput Secur 2019. [DOI: 10.1016/j.cose.2018.12.012] [Citation(s) in RCA: 64] [Impact Index Per Article: 12.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
68
A Survey of Deep Learning Methods for Cyber Security. INFORMATION 2019. [DOI: 10.3390/info10040122] [Citation(s) in RCA: 201] [Impact Index Per Article: 40.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/15/2022]  Open
69
Sun P, Li J, Alam Bhuiyan MZ, Wang L, Li B. Modeling and clustering attacker activities in IoT through machine learning techniques. Inf Sci (N Y) 2019. [DOI: 10.1016/j.ins.2018.04.065] [Citation(s) in RCA: 32] [Impact Index Per Article: 6.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
70
Zago M, Gil Pérez M, Martínez Pérez G. Scalable detection of botnets based on DGA. Soft comput 2019. [DOI: 10.1007/s00500-018-03703-8] [Citation(s) in RCA: 10] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
71
Liu A, Sun B. An Intrusion Detection System Based on a Quantitative Model of Interaction Mode Between Ports. IEEE ACCESS 2019;7:161725-161740. [DOI: 10.1109/access.2019.2951839] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
72
Nicholas L, Ooi SY, Pang YH, Hwang SO, Tan SY. Study of long short-term memory in flow-based network intrusion detection system. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2018. [DOI: 10.3233/jifs-169836] [Citation(s) in RCA: 12] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
73
AA-HMM: An Anti-Adversarial Hidden Markov Model for Network-Based Intrusion Detection. APPLIED SCIENCES-BASEL 2018. [DOI: 10.3390/app8122421] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
74
Leveraging Image Representation of Network Traffic Data and Transfer Learning in Botnet Detection. BIG DATA AND COGNITIVE COMPUTING 2018. [DOI: 10.3390/bdcc2040037] [Citation(s) in RCA: 15] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
75
Ring M, Landes D, Hotho A. Detection of slow port scans in flow-based network traffic. PLoS One 2018;13:e0204507. [PMID: 30252894 PMCID: PMC6156027 DOI: 10.1371/journal.pone.0204507] [Citation(s) in RCA: 19] [Impact Index Per Article: 3.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/01/2018] [Accepted: 06/05/2018] [Indexed: 11/17/2022]  Open
76
Goodall JR, Ragan ED, Steed CA, Reed JW, Richardson GD, Huffer KMT, Bridges RA, Laska JA. Situ: Identifying and Explaining Suspicious Behavior in Networks. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 2018;25:204-214. [PMID: 30136975 DOI: 10.1109/tvcg.2018.2865029] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/07/2023]
77
Pektaş A, Acarman T. Deep learning to detect botnet via network flow summaries. Neural Comput Appl 2018. [DOI: 10.1007/s00521-018-3595-x] [Citation(s) in RCA: 27] [Impact Index Per Article: 4.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
78
Muller S, Lancrenon J, Harpes C, Le Traon Y, Gombault S, Bonnin JM. A training-resistant anomaly detection system. Comput Secur 2018. [DOI: 10.1016/j.cose.2018.02.015] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
79
UGR‘16: A new dataset for the evaluation of cyclostationarity-based network IDSs. Comput Secur 2018. [DOI: 10.1016/j.cose.2017.11.004] [Citation(s) in RCA: 91] [Impact Index Per Article: 15.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/22/2022]
80
Kozik R. Distributing extreme learning machines with Apache Spark for NetFlow-based malware activity detection. Pattern Recognit Lett 2018. [DOI: 10.1016/j.patrec.2017.11.004] [Citation(s) in RCA: 18] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
81
Intelligent OS X malware threat detection with code inspection. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES 2017. [DOI: 10.1007/s11416-017-0307-5] [Citation(s) in RCA: 44] [Impact Index Per Article: 6.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
82
Flow-based intrusion detection: Techniques and challenges. Comput Secur 2017. [DOI: 10.1016/j.cose.2017.05.009] [Citation(s) in RCA: 96] [Impact Index Per Article: 13.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
83
Ijaz S, Hashmi FA, Asghar S, Alam M. Vector Based Genetic Algorithm to optimize predictive analysis in network security. APPL INTELL 2017. [DOI: 10.1007/s10489-017-1026-9] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
84
Ji Y, He Y, Jiang X, Cao J, Li Q. Combating the evasion mechanisms of social bots. Comput Secur 2016. [DOI: 10.1016/j.cose.2016.01.007] [Citation(s) in RCA: 21] [Impact Index Per Article: 2.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
85
Unwanted Traffic Identification in Large-Scale University Networks: A Case Study. BIG DATA ANALYTICS 2016. [DOI: 10.1007/978-81-322-3628-3_9] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]  Open
86
An Entropy-Based Network Anomaly Detection Method. ENTROPY 2015. [DOI: 10.3390/e17042367] [Citation(s) in RCA: 110] [Impact Index Per Article: 12.2] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
PrevPage 2 of 2 12Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA