Author:
Shrivastava Rajesh Kumar,Singh Simar Preet,Pujahari Abinash
Publisher
Springer Nature Singapore
Reference12 articles.
1. Bhatnagar D, Jaya SubaLakshmi R, Vanmathi C (2020) Twitter sentiment analysis using elasticsearch, logstash and kibana. In: 2020 international conference on emerging trends in information technology and engineering (ic-ETITE), pp 1–5
2. Capó M, Pérez A, Lozano JA (2018) An efficient k-means clustering algorithm for massive data. arXiv preprint arXiv:1801.02949
3. Durumeric Z, Wustrow E, Halderman JA (2013) Fast internet-wide scanning and its security applications. Zmap. In USENIX security symposium, vol 8, pp 47–53
4. Kolias C, Kambourakis G, Stavrou A, Voas J (2017) Ddos in the IoT: Mirai and other botnets. Computer 50(7):80–84
5. Selvaraj R, Kuthadi VM, Marwala T (2016) Ant-based distributed denial of service detection technique using roaming virtual honeypots. IET Commun 10(8):929–935