Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference13 articles.
1. Ji, Y., He, Y., Zhu, D., Li, Q., & Guo, D. (2014). A multiprocess mechanism of evading behavior-based bot detection approaches. Information Security Practice and Experience, 8434, 75–89.
2. Karim, A., Salleh, R. B., Shiraz, M., Shah, S. A. A., Awan, I., & Anuar, N. B. (2014). Botnet detection techniques: review, future trends, and issues. Journal of Zhejiang University Science, 15(11), 943–983.
3. Nagaraja, S. (2014). Botyacc: Unified P2P botnet detection using behavioural analysis and graph analysis. Computer Security—ESORICS 2014 Lecture Notes in Computer Science, 8713, 439–456.
4. Haddadi, F., Le Cong, D., Porter, L., & Zincir-Heywood, A. N. (2015). On the effectiveness of different botnet detection approaches. Information Security Practice and Experience Lecture Notes in Computer Science, 9065, 121–135.
5. Pomorova, O., Savenko, O., Lysenko, S., Kryshchuk, A., & Nicheporuk, A. (2014). A technique for detection of bots which are using polymorphic code. Computer Networks Communications in Computer and Information Science, 431, 265–276.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Intelligent Storage Innovation of Intelligent Supply Chain Based on Internet of Things and Real-Time Database System;2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE);2023-04-29
2. An Efficient Mobile Communication Using Energy-Efficient Dynamic Cognitive Aware;2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS);2023-03-17