Author:
Alieyan Kamal,ALmomani Ammar,Manasrah Ahmad,Kadhum Mohammed M.
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Software
Reference90 articles.
1. Stevanovic M, Revsbech K, Pedersen JM, Sharp R, Jensen CD (2012) A collaborative approach to botnet protection. In: Quirchmayr G, Basl J, You I, Xu L, Weippl E (eds) International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES 2012), pp 624–638
2. Stevanovic M, Pedersen JM (2013) Machine learning for identifying botnet network traffic, Technical report, Aalborg University
3. Alomari E, Manickam S, Gupta B, Karuppayah S, Alfaris R (2012) Botnet-based distributed denial of service (DDoS) attacks on web servers: classification and art. arXiv preprint arXiv:12080403
4. Lu W, Rammidi G, Ghorbani AA (2011) Clustering botnet communication traffic based on n-gram feature selection. Comput Commun 34(3):502–514
5. McAfee. (2015) McAfee labs threats report. Accessed 18 May 2015. http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q4-2014.pdf
Cited by
80 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献