• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4642360)   Today's Articles (145)   Subscriber (50510)
For: Singh K, Guntuku SC, Thakur A, Hota C. Big Data Analytics framework for Peer-to-Peer Botnet detection using Random Forests. Inf Sci (N Y) 2014. [DOI: 10.1016/j.ins.2014.03.066] [Citation(s) in RCA: 103] [Impact Index Per Article: 10.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
Number Cited by Other Article(s)
1
Real-time botnet detection on large network bandwidths using machine learning. Sci Rep 2023;13:4282. [PMID: 36922641 PMCID: PMC10017669 DOI: 10.1038/s41598-023-31260-0] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/18/2022] [Accepted: 03/08/2023] [Indexed: 03/18/2023]  Open
2
Wang H, He H, Zhang W, Liu W, Liu P, Javadpour A. Using honeypots to model botnet attacks on the internet of medical things. COMPUTERS & ELECTRICAL ENGINEERING : AN INTERNATIONAL JOURNAL 2022;102:108212. [PMID: 35821875 PMCID: PMC9264116 DOI: 10.1016/j.compeleceng.2022.108212] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 01/16/2022] [Revised: 06/21/2022] [Accepted: 06/29/2022] [Indexed: 06/15/2023]
3
Wen C, Huai T, Zhang Q, Song Z, Cao F. A new rotation forest ensemble algorithm. INT J MACH LEARN CYB 2022. [DOI: 10.1007/s13042-022-01613-8] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
4
Design and Protection Strategy of Distributed Intrusion Detection System in Big Data Environment. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE 2022;2022:4720169. [PMID: 35814593 PMCID: PMC9259256 DOI: 10.1155/2022/4720169] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/30/2022] [Revised: 06/13/2022] [Accepted: 06/16/2022] [Indexed: 11/18/2022]
5
Yang Z, Liu X, Li T, Wu D, Wang J, Zhao Y, Han H. A systematic literature review of methods and datasets for anomaly-based network intrusion detection. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102675] [Citation(s) in RCA: 12] [Impact Index Per Article: 6.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
6
SUKRY: Suricata IDS with Enhanced kNN Algorithm on Raspberry Pi for Classifying IoT Botnet Attacks. ELECTRONICS 2022. [DOI: 10.3390/electronics11050737] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
7
Distributed Denial-of-Service (DDoS) Attacks and Defence Mechanisms in Various Web-enabled Computing Platforms. INT J SEMANT WEB INF 2022. [DOI: 10.4018/ijswis.297143] [Citation(s) in RCA: 5] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
8
An Ensemble of Prediction and Learning Mechanism for Improving Accuracy of Anomaly Detection in Network Intrusion Environments. SUSTAINABILITY 2021. [DOI: 10.3390/su131810057] [Citation(s) in RCA: 15] [Impact Index Per Article: 5.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/30/2022]
9
Vargaftik S, Keslassy I, Orda A, Ben-Itzhak Y. RADE: resource-efficient supervised anomaly detection using decision tree-based ensemble methods. Mach Learn 2021. [DOI: 10.1007/s10994-021-06047-x] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
10
A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies. ENTROPY 2021;23:e23050529. [PMID: 33923125 PMCID: PMC8145138 DOI: 10.3390/e23050529] [Citation(s) in RCA: 9] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/15/2021] [Revised: 04/11/2021] [Accepted: 04/20/2021] [Indexed: 12/03/2022]
11
Asad M, Asim M, Javed T, Beg MO, Mujtaba H, Abbas S. DeepDetect: Detection of Distributed Denial of Service Attacks Using Deep Learning. THE COMPUTER JOURNAL 2020;63:983-994. [DOI: 10.1093/comjnl/bxz064] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
12
NTARC: A Data Model for the Systematic Review of Network Traffic Analysis Research. APPLIED SCIENCES-BASEL 2020. [DOI: 10.3390/app10124307] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
13
Bhatt P, Thakker B. Isolating botnet attacks using Bootstrap Aggregating Surflex-PSIM Classifier in IoT. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2020. [DOI: 10.3233/jifs-190183] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
14
Mousavi S, Khansari M, Rahmani R. A fully scalable big data framework for Botnet detection based on network traffic analysis. Inf Sci (N Y) 2020. [DOI: 10.1016/j.ins.2019.10.018] [Citation(s) in RCA: 18] [Impact Index Per Article: 4.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
15
Wang W, Shang Y, He Y, Li Y, Liu J. BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors. Inf Sci (N Y) 2020. [DOI: 10.1016/j.ins.2019.09.024] [Citation(s) in RCA: 98] [Impact Index Per Article: 24.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
16
Li J, Zhang J, Qin X, Xun Y. Feature grouping-based parallel outlier mining of categorical data using spark. Inf Sci (N Y) 2019. [DOI: 10.1016/j.ins.2019.07.045] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
17
Performance evaluation of Botnet DDoS attack detection using machine learning. EVOLUTIONARY INTELLIGENCE 2019. [DOI: 10.1007/s12065-019-00310-w] [Citation(s) in RCA: 36] [Impact Index Per Article: 7.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
18
Real-time big data processing for anomaly detection: A Survey. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2019. [DOI: 10.1016/j.ijinfomgt.2018.08.006] [Citation(s) in RCA: 158] [Impact Index Per Article: 31.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
19
Sun P, Li J, Alam Bhuiyan MZ, Wang L, Li B. Modeling and clustering attacker activities in IoT through machine learning techniques. Inf Sci (N Y) 2019. [DOI: 10.1016/j.ins.2018.04.065] [Citation(s) in RCA: 32] [Impact Index Per Article: 6.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
20
Ebadati OME, Ahmadzadeh F. Classification Spam Email with Elimination of Unsuitable Features with Hybrid of GA-Naive Bayes. JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT 2019. [DOI: 10.1142/s0219649219500084] [Citation(s) in RCA: 10] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
21
The state of the art and taxonomy of big data analytics: view from new big data framework. Artif Intell Rev 2019. [DOI: 10.1007/s10462-019-09685-9] [Citation(s) in RCA: 66] [Impact Index Per Article: 13.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/05/2023]
22
Wireless Sensor Networks Intrusion Detection Based on SMOTE and the Random Forest Algorithm. SENSORS 2019;19:s19010203. [PMID: 30626020 PMCID: PMC6339008 DOI: 10.3390/s19010203] [Citation(s) in RCA: 60] [Impact Index Per Article: 12.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/13/2018] [Revised: 12/27/2018] [Accepted: 01/04/2019] [Indexed: 11/21/2022]
23
Martínez Torres J, Iglesias Comesaña C, García-Nieto PJ. Review: machine learning techniques applied to cybersecurity. INT J MACH LEARN CYB 2019. [DOI: 10.1007/s13042-018-00906-1] [Citation(s) in RCA: 47] [Impact Index Per Article: 9.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
24
Galicia A, Talavera-Llames R, Troncoso A, Koprinska I, Martínez-Álvarez F. Multi-step forecasting for big data time series based on ensemble learning. Knowl Based Syst 2019. [DOI: 10.1016/j.knosys.2018.10.009] [Citation(s) in RCA: 57] [Impact Index Per Article: 11.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/28/2022]
25
Network anomaly detection based on probabilistic analysis. Soft comput 2018. [DOI: 10.1007/s00500-017-2679-3] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
26
Ahamed NU, Kobsar D, Benson L, Clermont C, Kohrs R, Osis ST, Ferber R. Using wearable sensors to classify subject-specific running biomechanical gait patterns based on changes in environmental weather conditions. PLoS One 2018;13:e0203839. [PMID: 30226903 PMCID: PMC6143236 DOI: 10.1371/journal.pone.0203839] [Citation(s) in RCA: 20] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/08/2018] [Accepted: 08/28/2018] [Indexed: 01/07/2023]  Open
27
Kim JY, Bu SJ, Cho SB. Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders. Inf Sci (N Y) 2018. [DOI: 10.1016/j.ins.2018.04.092] [Citation(s) in RCA: 93] [Impact Index Per Article: 15.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
28
Bin N. Research on Methods and Techniques for IoT Big Data Cluster Analysis. 2018 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS AND COMPUTER AIDED EDUCATION (ICISCAE) 2018. [DOI: 10.1109/iciscae.2018.8666889] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
29
Torrecilla JL, Romo J. Data learning from big data. Stat Probab Lett 2018. [DOI: 10.1016/j.spl.2018.02.038] [Citation(s) in RCA: 32] [Impact Index Per Article: 5.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
30
Li J, Zhao Z, Li R. Machine learning‐based IDS for software‐defined 5G network. IET NETWORKS 2018. [DOI: 10.1049/iet-net.2017.0212] [Citation(s) in RCA: 48] [Impact Index Per Article: 8.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
31
Zhou W, Yu L, Qiu W, Zhou Y, Wu M. Local gradient patterns (LGP): An effective local-statistical-feature extraction scheme for no-reference image quality assessment. Inf Sci (N Y) 2017. [DOI: 10.1016/j.ins.2017.02.049] [Citation(s) in RCA: 32] [Impact Index Per Article: 4.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
32
Bansal N, Singh R, Sharma A. An Insight into State-of-the-Art Techniques for Big Data Classification. INTERNATIONAL JOURNAL OF INFORMATION SYSTEM MODELING AND DESIGN 2017. [DOI: 10.4018/ijismd.2017070102] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
33
Using machine learning and big data approaches to predict travel time based on historical and real-time data from Taiwan electronic toll collection. Soft comput 2017. [DOI: 10.1007/s00500-017-2610-y] [Citation(s) in RCA: 26] [Impact Index Per Article: 3.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
34
Keegan N, Ji SY, Chaudhary A, Concolato C, Yu B, Jeong DH. A survey of cloud-based network intrusion detection analysis. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES 2016. [DOI: 10.1186/s13673-016-0076-z] [Citation(s) in RCA: 62] [Impact Index Per Article: 7.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/10/2022]
35
Liu X, Ye Q. The different impacts of news-driven and self-initiated search volume on stock prices. INFORMATION & MANAGEMENT 2016. [DOI: 10.1016/j.im.2016.05.009] [Citation(s) in RCA: 18] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
36
Metric forests based on Gaussian mixture model for visual image classification. Soft comput 2016. [DOI: 10.1007/s00500-016-2350-4] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
37
Lin CY, Kao YH, Lee WB, Chen RC. An efficient reversible privacy-preserving data mining technology over data streams. SPRINGERPLUS 2016;5:1407. [PMID: 27610326 PMCID: PMC4995193 DOI: 10.1186/s40064-016-3095-3] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/28/2016] [Accepted: 08/17/2016] [Indexed: 11/10/2022]
38
Account classification in online social networks with LBCA and wavelets. Inf Sci (N Y) 2016. [DOI: 10.1016/j.ins.2015.10.039] [Citation(s) in RCA: 26] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
39
Sharma S, Chang V, Tim US, Wong J, Gadiad S. TEMPORARY REMOVAL: Cloud-based emerging services systems. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2016. [DOI: 10.1016/j.ijinfomgt.2016.03.006] [Citation(s) in RCA: 11] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
40
Pan W, Xue J, Lu K, Zhai R, Dai S. Hybrid architecture for 3D visualization of ultrasonic data. Inf Sci (N Y) 2015. [DOI: 10.1016/j.ins.2015.03.026] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
41
P2P and P2P botnet traffic classification in two stages. Soft comput 2015. [DOI: 10.1007/s00500-015-1863-6] [Citation(s) in RCA: 12] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
42
SSFile: A novel column-store for efficient data analysis in Hadoop-based distributed systems. Inf Sci (N Y) 2015. [DOI: 10.1016/j.ins.2015.04.014] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/19/2022]
43
Block-based selection random forest for texture classification using multi-fractal spectrum feature. Neural Comput Appl 2015. [DOI: 10.1007/s00521-015-1880-5] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
44
The rise of “big data” on cloud computing: Review and open research issues. INFORM SYST 2015. [DOI: 10.1016/j.is.2014.07.006] [Citation(s) in RCA: 1503] [Impact Index Per Article: 167.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/01/2023]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA