Author:
Chen Chia-Mei,Lo Wen-Ling,Lai Gu-Hsin,Hu Yu-Chen
Publisher
Springer International Publishing
Reference16 articles.
1. European Union Agency for Network and Information Security, ENISA. Threat Landscape Report 2017. https://www.enisa.europa.eu/publications/enisa-threat-landscape-report-2017
2. Blumbergs B.: Technical analysis of advanced threat tactics targeting critical information infrastructure. Cyber Security Review, Winter (2014)
3. Li, C., Jiang, W., Zou, X.: Botnet: survey and case study. In: Proceedings of 4th International Conference on Innovative Computing, Information and Control (ICICIC) (2009)
4. Cai, T., Zou, F.: Detecting HTTP botnet with clustering network traffic. In: Proceedings of 8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM) (2012)
5. Crotti, M., Dusi, M., Gringoli, F., Salgarelli, L.: Detecting HTTP tunnels with statistical mechanisms. In: Proceedings of 2007 IEEE International Conference on Communications (2007)