Author:
Sharma Amit,Gupta Brij B.,Singh Awadhesh Kumar,Saraswat V. K.
Publisher
Springer International Publishing
Reference15 articles.
1. Baksi, R., Upadhyaya, S.: Decepticon: A Hidden Markov Model Approach to Counter Advanced Persistent Threats, pp. 38–54 (2020). https://doi.org/10.1007/978-981-15-3817-9_3
2. Filiol, E., Josse, S.: New trends in security evaluation of Bayesian network-based malware detection models. In: 2012 45th Hawaii International Conference on System Sciences, pp. 5574–5583 (2012). https://doi.org/10.1109/HICSS.2012.450
3. Gupta, B.B., Misra, M., Joshi, R.C.: An ISP level solution to combat DDOS attacks using combined statistical based approach. arXiv preprint arXiv:1203.2400 (2012)
4. Gupta, S., et al.: Detection, avoidance, and attack pattern mechanisms in modern web application vulnerabilities: present and future challenges. Int. J. Cloud Appl. Comput. (IJCAC) 7(3), 1–43 (2017)
5. Han, W., Xue, J., Wang, Y., Zhang, F., Gao, X.: Aptmalinsight: identify and cognize apt malware based on system call information and ontology knowledge framework. Inf. Sci. 546, 633–664 (2021). https://www.sciencedirect.com/science/article/pii/S0020025520308628
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献