1. Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions;Aleesa,2019
2. New facets of mobile botnet: architecture and evaluation;Anagnostopoulos;International Journal of Information Security,2016
3. Beigi, E. B., Jazi, H. H., Stakhanova, N., and Ghorbani, A. A. (2014). Towards e ective feature selection in machine learning-based botnet detection approaches. 2014 IEEE Conference on Communications and Network Security, CNS 2014, pages 247 255.
4. LUCID: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection;Doriguzzi-Corin;IEEE Transactions on Network and Service Management,2020
5. Draper-Gil, G., Lashkari, A. H., Mamun, M. S. I., and Ghorbani, A. A. (2016). Characterisation of encrypted and VPN traffic using time-related features. ICISSP 2016 - Proceedings of the 2nd International Conference on Information Systems Security and Privacy, (Icissp):407 414.