Author:
Vinayakumar R.,Soman K. P.,Prabaharan Poornachandran ,Akarsh S.,Elhoseny Mohamed
Publisher
Springer International Publishing
Reference46 articles.
1. Kührer M, Rossow C, Holz T (2014) Paint it black: evaluating the effectiveness of malware blacklists. In: International workshop on recent advances in intrusion detection. Springer, Cham, pp 1–21
2. Antonakakis M, Perdisci R, Nadji Y, Vasiloglou N, Abu-Nimeh S, Lee W, Dagon D (2012) From throw-away traffic to bots: detecting the rise of DGA-based malware. In: P21st USENIX security symposium (USENIX security 12), pp 491–506
3. Krishnan S, Taylor T, Monrose F, McHugh J (2013) Crossing the threshold: detecting network malfeasance via sequential hypothesis testing. In: 2013 43rd annual IEEE/IFIP international conference on dependable systems and networks (DSN). IEEE, pp 1–12
4. Rao H, Shi X, Rodrigue AK, Feng J, Xia Y, Elhoseny M, Gu L (2019) Feature selection based on artificial bee colony and gradient boosting decision tree. Appl Soft Comput 74:634–642
5. LeCun Y, Bengio Y, Hinton G (2015) Deep learning. Nature 521(7553):436
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献