Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Cognitive Neuroscience,Computer Vision and Pattern Recognition,Mathematics (miscellaneous)
Reference60 articles.
1. Al-Jarrah OY, Alhussein O, Yoo PD, Muhaidat S, Taha K, Kim K (2016) Data randomization and cluster-based partitioning for Botnet intrusion detection. IEEE Trans Cybern 46(8):1796–1806
2. Bhushan K, Gupta BB (2018) Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-0800-9
3. Tom Ball (2018) Malicious Botnets responsible for 40% of global login attempts. https://www.cbronline.com/news/malicious-Botnets-login
4. Nadji Y, Antonakakis M, Perdisci R, Dagon D, Lee W (2013) Beheading hydras: performing effective Botnet takedowns. In: Proceedings of the 2013 ACM SIGSAC conference on computer & communications security, pp 121–132
5. Cao N, Li G, Zhu P, Sun Q, Wang Y, Li J, Zhao Y (2018) Handling the adversarial attacks. J Ambient Intell Humaniz Comput 1–15
Cited by
159 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献