Subject
Management of Technology and Innovation,Artificial Intelligence,Computer Science Applications,Hardware and Architecture,Engineering (miscellaneous),Information Systems,Computer Science (miscellaneous),Software
Reference36 articles.
1. Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection;Gu,2008
2. L. Bilge, D. Balzarotti, W. Robertson, E. Kirda, C. Kruegel, Disclosure: detecting botnet command and control servers through large-scale netflow analysis, in: Proceedings of the 28th Annual Computer Security Applications Conference, 2012, pp. 129–138.
3. Evasion techniques: Sneaking through your intrusion detection/prevention systems;Cheng;IEEE Commun. Surv. Tutor.,2011
4. Botnet detection using graph-based feature clustering;Chowdhury;J. Big Data,2017
5. A graph-based machine learning approach for bot detection;Abou Daya,2019
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献