Publisher
Springer International Publishing
Reference31 articles.
1. Albert, B.: Weka 3: Machine learning software in Java. https://www.cs.waikato.ac.nz/ml/weka/
2. Argus, O.: Argus. https://openargus.org
3. Bahtiyar, S.: Anatomy of targeted attacks with smart malware. Secur. Commun. Netw. 9 (2017). https://doi.org/10.1002/sec.1767
4. Beigi, E., Jazi, H., Stakhanova, N., Ghorbani, A.: Towards effective feature selection in machine learning-based botnet detection approaches. In: 2014 IEEE Conference on Communications and Network Security, CNS 2014, pp. 247–255, December 2014. https://doi.org/10.1109/CNS.2014.6997492
5. Bogdan, B.: Six years and counting: inside the complex Zacinlo ad fraud operation, bitdefender. https://labs.bitdefender.com/2018/06/six-years-and-counting-inside-the-complex-zacinlo-ad-fraud-operation/