• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4616374)   Today's Articles (686)   Subscriber (49394)
For: Alauthaman M, Aslam N, Zhang L, Alasem R, Hossain MA. A P2P Botnet detection scheme based on decision tree and adaptive multilayer neural networks. Neural Comput Appl 2018;29:991-1004. [PMID: 29769759 PMCID: PMC5940715 DOI: 10.1007/s00521-016-2564-5] [Citation(s) in RCA: 62] [Impact Index Per Article: 10.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/31/2015] [Accepted: 08/17/2016] [Indexed: 11/28/2022]
Number Cited by Other Article(s)
1
PeerAmbush: Multi-Layer Perceptron to Detect Peer-to-Peer Botnet. Symmetry (Basel) 2022. [DOI: 10.3390/sym14122483] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]  Open
2
Efficient, Lightweight Cyber Intrusion Detection System for IoT Ecosystems Using MI2G Algorithm. COMPUTERS 2022. [DOI: 10.3390/computers11100142] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
3
Waqas M, Tu S, Halim Z, Rehman SU, Abbas G, Abbas ZH. The role of artificial intelligence and machine learning in wireless networks security: principle, practice and challenges. Artif Intell Rev 2022. [DOI: 10.1007/s10462-022-10143-2] [Citation(s) in RCA: 4] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
4
Phishing Website Detection with semantic features Based on Machine learning Classifiers-A Comparative Study. INT J SEMANT WEB INF 2022. [DOI: 10.4018/ijswis.297032] [Citation(s) in RCA: 10] [Impact Index Per Article: 5.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
5
Securing Smart Cities using LSTM algorithm and lightweight containers against botnet attacks. Appl Soft Comput 2021. [DOI: 10.1016/j.asoc.2021.107859] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
6
Joshi C, Ranjan RK, Bharti V. A Fuzzy Logic based feature engineering approach for Botnet detection using ANN. JOURNAL OF KING SAUD UNIVERSITY - COMPUTER AND INFORMATION SCIENCES 2021. [DOI: 10.1016/j.jksuci.2021.06.018] [Citation(s) in RCA: 7] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
7
A Consolidated Decision Tree-Based Intrusion Detection System for Binary and Multiclass Imbalanced Datasets. MATHEMATICS 2021. [DOI: 10.3390/math9070751] [Citation(s) in RCA: 30] [Impact Index Per Article: 10.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
8
Apruzzese G, Andreolini M, Marchetti M, Venturi A, Colajanni M. Deep Reinforcement Adversarial Learning Against Botnet Evasion Attacks. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT 2020. [DOI: 10.1109/tnsm.2020.3031843] [Citation(s) in RCA: 23] [Impact Index Per Article: 5.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/07/2022]
9
Rejeb A, Keogh JG, Treiblmaier H. How Blockchain Technology Can Benefit Marketing: Six Pending Research Areas. FRONTIERS IN BLOCKCHAIN 2020. [DOI: 10.3389/fbloc.2020.00003] [Citation(s) in RCA: 47] [Impact Index Per Article: 11.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/13/2022]
10
A new approach for intrusion detection system based on training multilayer perceptron by using enhanced Bat algorithm. Neural Comput Appl 2019. [DOI: 10.1007/s00521-019-04655-2] [Citation(s) in RCA: 18] [Impact Index Per Article: 3.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
11
Training a Neural Network for Cyberattack Classification Applications Using Hybridization of an Artificial Bee Colony and Monarch Butterfly Optimization. Neural Process Lett 2019. [DOI: 10.1007/s11063-019-10120-x] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
12
Panimalar P, Rameshkumar K. A Novel Traffic Analysis Model for Botnet Discovery in Dynamic Network. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING 2019. [DOI: 10.1007/s13369-018-3319-7] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/28/2022]
13
Efficacy Improvement of Anomaly Detection by Using Intelligence Sharing Scheme. APPLIED SCIENCES-BASEL 2019. [DOI: 10.3390/app9030364] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
14
Pektaş A, Acarman T. Deep learning to detect botnet via network flow summaries. Neural Comput Appl 2018. [DOI: 10.1007/s00521-018-3595-x] [Citation(s) in RCA: 27] [Impact Index Per Article: 4.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA