• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4599785)   Today's Articles (3797)   Subscriber (49360)
For: García S, Grill M, Stiborek J, Zunino A. An empirical comparison of botnet detection methods. Comput Secur 2014. [DOI: 10.1016/j.cose.2014.05.011] [Citation(s) in RCA: 198] [Impact Index Per Article: 19.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
Number Cited by Other Article(s)
1
Ji IH, Lee JH, Kang MJ, Park WJ, Jeon SH, Seo JT. Artificial Intelligence-Based Anomaly Detection Technology over Encrypted Traffic: A Systematic Literature Review. SENSORS (BASEL, SWITZERLAND) 2024;24:898. [PMID: 38339615 PMCID: PMC10857182 DOI: 10.3390/s24030898] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/31/2023] [Revised: 12/31/2023] [Accepted: 01/26/2024] [Indexed: 02/12/2024]
2
Medina-Arco JG, Magán-Carrión R, Rodríguez-Gómez RA, García-Teodoro P. Methodology for the Detection of Contaminated Training Datasets for Machine Learning-Based Network Intrusion-Detection Systems. SENSORS (BASEL, SWITZERLAND) 2024;24:479. [PMID: 38257574 PMCID: PMC10819357 DOI: 10.3390/s24020479] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/14/2023] [Revised: 01/08/2024] [Accepted: 01/10/2024] [Indexed: 01/24/2024]
3
Hossain MA, Islam MS. A novel hybrid feature selection and ensemble-based machine learning approach for botnet detection. Sci Rep 2023;13:21207. [PMID: 38040793 PMCID: PMC10692109 DOI: 10.1038/s41598-023-48230-1] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/31/2023] [Accepted: 11/23/2023] [Indexed: 12/03/2023]  Open
4
Alam S, Alam Y, Cui S, Akujuobi C. Data-Driven Network Analysis for Anomaly Traffic Detection. SENSORS (BASEL, SWITZERLAND) 2023;23:8174. [PMID: 37837004 PMCID: PMC10574999 DOI: 10.3390/s23198174] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/28/2023] [Revised: 09/06/2023] [Accepted: 09/15/2023] [Indexed: 10/15/2023]
5
Djenna A, Barka E, Benchikh A, Khadir K. Unmasking Cybercrime with Artificial-Intelligence-Driven Cybersecurity Analytics. SENSORS (BASEL, SWITZERLAND) 2023;23:6302. [PMID: 37514596 PMCID: PMC10383531 DOI: 10.3390/s23146302] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/02/2023] [Revised: 06/13/2023] [Accepted: 06/15/2023] [Indexed: 07/30/2023]
6
Natkaniec M, Bednarz M. Wireless Local Area Networks Threat Detection Using 1D-CNN. SENSORS (BASEL, SWITZERLAND) 2023;23:5507. [PMID: 37420675 DOI: 10.3390/s23125507] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/23/2023] [Revised: 06/01/2023] [Accepted: 06/09/2023] [Indexed: 07/09/2023]
7
Real-time botnet detection on large network bandwidths using machine learning. Sci Rep 2023;13:4282. [PMID: 36922641 PMCID: PMC10017669 DOI: 10.1038/s41598-023-31260-0] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/18/2022] [Accepted: 03/08/2023] [Indexed: 03/18/2023]  Open
8
Adv-Bot: Realistic Adversarial Botnet Attacks against Network Intrusion Detection Systems. Comput Secur 2023. [DOI: 10.1016/j.cose.2023.103176] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/12/2023]
9
Wu B, Zou F, Zhang C, Yu T, Li Y. Multi-field relation mining for malicious HTTP traffic detection based on attention and cross network. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2023. [DOI: 10.1016/j.jisa.2022.103411] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/11/2023]
10
Pinto A, Herrera LC, Donoso Y, Gutierrez JA. Survey on Intrusion Detection Systems Based on Machine Learning Techniques for the Protection of Critical Infrastructure. SENSORS (BASEL, SWITZERLAND) 2023;23:2415. [PMID: 36904618 PMCID: PMC10007329 DOI: 10.3390/s23052415] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/22/2022] [Revised: 02/16/2023] [Accepted: 02/20/2023] [Indexed: 06/18/2023]
11
D’hooge L, Verkerken M, Wauters T, De Turck F, Volckaert B. Investigating Generalized Performance of Data-Constrained Supervised Machine Learning Models on Novel, Related Samples in Intrusion Detection. SENSORS (BASEL, SWITZERLAND) 2023;23:1846. [PMID: 36850444 PMCID: PMC9960990 DOI: 10.3390/s23041846] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/17/2022] [Revised: 02/02/2023] [Accepted: 02/03/2023] [Indexed: 06/18/2023]
12
Xing Y, Shu H, Kang F. PeerRemove: An Adaptive Node Removal Strategy for P2P Botnet Based on Deep Reinforcement Learning. Comput Secur 2023. [DOI: 10.1016/j.cose.2023.103129] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/04/2023]
13
Levshun D, Kotenko I. A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities. Artif Intell Rev 2023. [DOI: 10.1007/s10462-022-10381-4] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/09/2023]
14
Mvula PK, Branco P, Jourdan GV, Viktor HL. A systematic literature review of cyber-security data repositories and performance assessment metrics for semi-supervised learning. DISCOVER DATA 2023;1:4. [PMID: 37038388 PMCID: PMC10079755 DOI: 10.1007/s44248-023-00003-x] [Citation(s) in RCA: 2] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 01/27/2023] [Accepted: 03/21/2023] [Indexed: 04/12/2023]
15
Botnet dataset with simultaneous attack activity. Data Brief 2022;45:108628. [DOI: 10.1016/j.dib.2022.108628] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/03/2022] [Revised: 09/11/2022] [Accepted: 09/19/2022] [Indexed: 11/21/2022]  Open
16
A novel hierarchical attention-based triplet network with unsupervised domain adaptation for network intrusion detection. APPL INTELL 2022. [DOI: 10.1007/s10489-022-04076-0] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
17
Almashhadani AO, Carlin D, Kaiiali M, Sezer S. MFMCNS: A Multi-Feature and Multi-Classifier Network-based System for Ransomworm Detection. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102860] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
18
Niu Z, Xue J, Qu D, Wang Y, Zheng J, Zhu H. A novel approach based on adaptive online analysis of encrypted traffic for identifying Malware in IIoT. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.04.018] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
19
Improving the quality of generative models through Smirnov transformation. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.07.066] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/22/2022]
20
Chernikova A, Oprea A. FENCE: Feasible Evasion Attacks on Neural Networks in Constrained Environments. ACM TRANSACTIONS ON PRIVACY AND SECURITY 2022. [DOI: 10.1145/3544746] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
21
Datasets are not Enough: Challenges in Labeling Network Traffic. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102810] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
22
Human-guided auto-labeling for network traffic data: The GELM approach. Neural Netw 2022;152:510-526. [PMID: 35660547 DOI: 10.1016/j.neunet.2022.05.007] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/21/2021] [Revised: 04/08/2022] [Accepted: 05/10/2022] [Indexed: 11/22/2022]
23
Ding Q, Li J. AnoGLA: An efficient scheme to improve network anomaly detection. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2022. [DOI: 10.1016/j.jisa.2022.103149] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
24
Wang Z, Shao L, Cheng K, Liu Y, Jiang J, Nie Y, Li X, Kuang X. ICDF: Intrusion collaborative detection framework based on confidence. INT J INTELL SYST 2022. [DOI: 10.1002/int.22877] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/08/2022]
25
Tu T, Qin J, Zhang H, Chen M, Xu T, Huang Y. A comprehensive study of Mozi botnet. INT J INTELL SYST 2022. [DOI: 10.1002/int.22866] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/08/2022]
26
Schwengber BH, Vergutz A, Prates NG, Nogueira M. Learning From Network Data Changes for Unsupervised Botnet Detection. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT 2022. [DOI: 10.1109/tnsm.2021.3109076] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/08/2022]
27
Priyadarshini R, Barik RK. A deep learning based intelligent framework to mitigate DDoS attack in fog environment. JOURNAL OF KING SAUD UNIVERSITY - COMPUTER AND INFORMATION SCIENCES 2022. [DOI: 10.1016/j.jksuci.2019.04.010] [Citation(s) in RCA: 14] [Impact Index Per Article: 7.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
28
Mills R, Marnerides AK, Broadbent M, Race N. Practical Intrusion Detection of Emerging Threats. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT 2022. [DOI: 10.1109/tnsm.2021.3091517] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/10/2022]
29
A Novel Framework for Generating Personalized Network Datasets for NIDS Based on Traffic Aggregation. SENSORS 2022;22:s22051847. [PMID: 35270994 PMCID: PMC8914796 DOI: 10.3390/s22051847] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/30/2021] [Revised: 01/27/2022] [Accepted: 02/06/2022] [Indexed: 12/02/2022]
30
Li Y, Zhu M, Luo X, Yin L, Fu Y. A privacy-preserving botnet detection approach in largescale cooperative IoT environment. Neural Comput Appl 2022. [DOI: 10.1007/s00521-022-06934-x] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
31
Machine learning for encrypted malicious traffic detection: Approaches, datasets and comparative study. Comput Secur 2022. [DOI: 10.1016/j.cose.2021.102542] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
32
Ibitoye O, Shafiq M, Matrawy A. Differentially Private Self-normalizing Neural Networks for Adversarial Robustness in Federated Learning. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102631] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
33
Hu X, Gu C, Chen Y, Wei F. CBD: A Deep-Learning-Based Scheme for Encrypted Traffic Classification with a General Pre-Training Method. SENSORS 2021;21:s21248231. [PMID: 34960324 PMCID: PMC8705865 DOI: 10.3390/s21248231] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/22/2021] [Revised: 12/07/2021] [Accepted: 12/07/2021] [Indexed: 11/29/2022]
34
AEGR: a simple approach to gradient reversal in autoencoders for network anomaly detection. Soft comput 2021. [DOI: 10.1007/s00500-021-06110-8] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
35
Data Transformation Schemes for CNN-Based Network Traffic Analysis: A Survey. ELECTRONICS 2021. [DOI: 10.3390/electronics10162042] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
36
Al-mashhadi S, Anbar M, Hasbullah I, Alamiedy TA. Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic. PeerJ Comput Sci 2021;7:e640. [PMID: 34458571 PMCID: PMC8372004 DOI: 10.7717/peerj-cs.640] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/11/2021] [Accepted: 06/22/2021] [Indexed: 05/27/2023]
37
Attack Categorisation for IoT Applications in Critical Infrastructures, a Survey. APPLIED SCIENCES-BASEL 2021. [DOI: 10.3390/app11167228] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/26/2022]
38
Joshi C, Ranjan RK, Bharti V. A Fuzzy Logic based feature engineering approach for Botnet detection using ANN. JOURNAL OF KING SAUD UNIVERSITY - COMPUTER AND INFORMATION SCIENCES 2021. [DOI: 10.1016/j.jksuci.2021.06.018] [Citation(s) in RCA: 7] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
39
Mihailescu ME, Mihai D, Carabas M, Komisarek M, Pawlicki M, Hołubowicz W, Kozik R. The Proposition and Evaluation of the RoEduNet-SIMARGL2021 Network Intrusion Detection Dataset. SENSORS 2021;21:s21134319. [PMID: 34202616 PMCID: PMC8272217 DOI: 10.3390/s21134319] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/24/2021] [Revised: 06/17/2021] [Accepted: 06/18/2021] [Indexed: 11/19/2022]
40
An effective NIDS framework based on a comprehensive survey of feature optimization and classification techniques. Neural Comput Appl 2021. [DOI: 10.1007/s00521-021-06093-5] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
41
Venturi A, Apruzzese G, Andreolini M, Colajanni M, Marchetti M. DReLAB - Deep REinforcement Learning Adversarial Botnet: A benchmark dataset for adversarial attacks against botnet Intrusion Detection Systems. Data Brief 2021;34:106631. [PMID: 33365367 PMCID: PMC7749366 DOI: 10.1016/j.dib.2020.106631] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/21/2020] [Revised: 12/02/2020] [Accepted: 12/03/2020] [Indexed: 11/28/2022]  Open
42
Traffic classification in server farm using supervised learning techniques. Neural Comput Appl 2021. [DOI: 10.1007/s00521-020-05030-2] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
43
Cordero CG, Vasilomanolakis E, Wainakh A, Mühlhäuser M, Nadjm-Tehrani S. On Generating Network Traffic Datasets with Synthetic Attacks for Intrusion Detection. ACM TRANSACTIONS ON PRIVACY AND SECURITY 2021. [DOI: 10.1145/3424155] [Citation(s) in RCA: 7] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
44
Kenyon A, Deka L, Elizondo D. Are public intrusion datasets fit for purpose characterising the state of the art in intrusion event datasets. Comput Secur 2020. [DOI: 10.1016/j.cose.2020.102022] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
45
Apruzzese G, Andreolini M, Marchetti M, Venturi A, Colajanni M. Deep Reinforcement Adversarial Learning Against Botnet Evasion Attacks. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT 2020. [DOI: 10.1109/tnsm.2020.3031843] [Citation(s) in RCA: 23] [Impact Index Per Article: 5.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/07/2022]
46
Zhao J, Liu X, Yan Q, Li B, Shao M, Peng H. Multi-attributed heterogeneous graph convolutional network for bot detection. Inf Sci (N Y) 2020. [DOI: 10.1016/j.ins.2020.03.113] [Citation(s) in RCA: 24] [Impact Index Per Article: 6.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
47
Schlör D, Ring M, Hotho A. iNALU: Improved Neural Arithmetic Logic Unit. Front Artif Intell 2020;3:71. [PMID: 33733188 PMCID: PMC7861275 DOI: 10.3389/frai.2020.00071] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/01/2020] [Accepted: 08/05/2020] [Indexed: 11/20/2022]  Open
48
The effects of feature selection on the classification of encrypted botnet. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES 2020. [DOI: 10.1007/s11416-020-00367-7] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
49
Iannacone MD, Bridges RA. Quantifiable & comparable evaluations of cyber defensive capabilities: A survey & novel, unified approach. Comput Secur 2020. [DOI: 10.1016/j.cose.2020.101907] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
50
Blaise A, Bouet M, Conan V, Secci S. Botnet Fingerprinting: A Frequency Distributions Scheme for Lightweight Bot Detection. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT 2020. [DOI: 10.1109/tnsm.2020.2996502] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/06/2022]
PrevPage 1 of 2 12Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA