Publisher
Springer Nature Singapore
Reference20 articles.
1. Caroscio, E., Paul, J., Murray, J., Bhunia, S.: Analyzing the ransomware attack on D.C. metropolitan police department by babuk. In: 2022 IEEE International Systems Conference (SysCon), pp. 1–8. IEEE, Canada (2022) https://doi.org/10.1109/SysCon53536.2022.9773935
2. Hussain, F., Abbas S.G., Pires, I.M., Tanveer, S., Fayyaz, U.U., Garcia, N.M., et al.: A two-fold machine learning approach to prevent and detect IoT botnet attacks. IEEE Access 9, 163412–163430 (2021) https://doi.org/10.1109/ACCESS.2021.3131014
3. Bou-Harb, E., Debbabi, M., Assi, C.: Cyber scanning: a comprehensive survey. IEEE Commun. Surv. Tutor. 16(3), 1496–1519 (2013)
4. Roesch, M.: Snort - lightweight intrusion detection for networks. In: Proceedings of the 13th Conference on Systems Administration (LISA-1999), pp. 229–238. (1999)
5. Zhang, Z., Towey, D., Ying, Z., Zhang, Y., Zhou, Z.: MT4NS: metamorphic testing for network scanning. In: 2021 IEEE/ACM 6th International Workshop on Metamorphic Testing (MET), pp. 17–23. IEEE, Spain (2021) https://doi.org/10.1109/MET52542.2021.00010