Author:
Koroniotis Nickolaos,Moustafa Nour,Sitnikova Elena,Turnbull Benjamin
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference71 articles.
1. Bot-iot,2018
2. Towards automation of vulnerability and exploitation identification in iiot networks;Moustafa,2018
3. An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things;Moustafa;IEEE Internet Things J.,2018
4. Ddos in the iot: Mirai and other botnets;Kolias;Computer,2017
5. Cybersecurity and network forensics: Analysis of malicious traffic towards a honeynet with deep packet inspection;Pimenta Rodrigues;Appl. Sci.,2017
Cited by
954 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献