Publisher
Springer Nature Switzerland
Reference16 articles.
1. Asif, M., Abbas, S., Khan, M.A., et al.: MapReduce based intelligent model for intrusion detection using machine learning technique. J. King Saud Univ. Comput. Inf. Sci. 34 (2022). https://doi.org/10.1016/j.jksuci.2021.12.008
2. Aurangzaib, R., Iqbal, W., Abdullah, M. et al.: Scalable containerized pipeline for real-time big data analytics. In: Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom (2022)
3. Bleikertz, S., Vogel, C., Gross, T., Mödersheim, S.: Proactive security analysis of changes in virtualized infrastructures. In: ACM International Conference Proceeding Series (2015)
4. Campazas-Vega, A., Crespo-Martínez, I.S., Guerrero-Higueras, Á.M., et al.: Analysis of NetFlow Features’ Importance in Malicious Network Traffic Detection (2022)
5. Chen, Z., Ji, C.: Spatial-temporal modeling of malware propagation in networks. IEEE Trans. Neural Netw. 16, 1291–1303 (2005). https://doi.org/10.1109/TNN.2005.853425