Author:
Sharma Anshuman,Thakral Abha
Reference19 articles.
1. Elovici, Y., A. Shabtai, R. Moskovitch, G. Tahan, and C. Glezer. 2007. Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic. In Annual Conference on Artificial Intelligence, 44–50. Berlin, Heidelberg: Springer.
2. Goseva-Popstojanova, K., G. Anastasovski, A. Dimitrijevikj, R. Pantev, and B. Miller. 2014. Characterization and Classification of Malicious Web traffic. Computers & Security 42: 92–115.
3. Gordon, L.A., M.P. Loeb, W. Lucyshyn, and R. Richardson. 2005. 2005 CSI/FBI Computer Crime and Security Survey. Computer Security Journal 21 (3): 1.
4. Mohurle, S., and M. Patil, M. 2017. A Brief Study of Wannacry Threat: Ransomware Attack. International Journal of Advanced Research in Computer Science, 8(5).
5. Bernaille, L., R. Teixeira, I. Akodkenou, A. Soule, and K. Salamatian. 2006. Traffic Classification on the Fly. ACM SIGCOMM Computer Communication Review 36 (2): 23–26.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献