Author:
Mosharrat Nazifa,Sarker Iqbal H.,Anwar Md Musfique,Islam Muhammad Nazrul,Watters Paul,Hammoudeh Mohammad
Reference24 articles.
1. Carlin A, Hammoudeh M, Aldabbas O (2015) Intrusion detection and countermeasure of virtual cloud systems-state of the art and current challenges. Int J Adv Comput Sci Appl 6(6)
2. Sarker IH, Hasan Furhad M, Nowrozy R (2021) AI-driven cybersecurity: an overview, security intelligence modeling and research directions. SN Comput Sci 2(3):1–18
3. Lookout app genome report. https://www.mylookout.com/appgenome, 2011. https://www.statista.com/statistics/273550/, Online accessed (14/07/2021)
4. Johnson J (2021) Annual number of data breaches and exposed records in the United States from 2005 to 2020, 3 Mar 2021. https://www.statista.com/statistics/273550/, Online accessed (14/07/2021)
5. Ghafir I, Prenosil V, Hammoudeh M, Baker T, Jabbar S, Khalid S, Jaf S (2018) BotDet: a system for real time botnet command and control traffic detection. IEEE Access 6:38947–38958
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献