Affiliation:
1. National Institute of Information and Communications Technology
2. Kyushu University
3. clwit Inc.
Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Artificial Intelligence,Electrical and Electronic Engineering,Computer Vision and Pattern Recognition,Hardware and Architecture,Software
Reference26 articles.
1. [1] C. Han, J. Shimamura, T. Takahashi, D. Inoue, M. Kawakita, J. Takeuchi, and K. Nakao, “Real-time detection of malware activities by analyzing darknet traffic using graphical lasso,” 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom), pp.144-151, IEEE, 2019. 10.1109/trustcom/bigdatase.2019.00028
2. [2] M. Bailey, E. Cooke, F. Jahanian, and J. Nazario, “The internet motion sensor-A distributed blackhole monitoring system,” Proc. Network and Distributed System Security Symposium (NDSS), The Internet Society, pp.167-179, 2005.
3. [3] M. Bailey, E. Cooke, F. Jahanian, A. Myrick, and S. Sinha, “Practical darknet measurement,” 40th Annual Conference on Information Sciences and Systems, pp.1496-1501, IEEE, 2006. 10.1109/ciss.2006.286376
4. [4] V. Yegneswaran, P. Barford, and D. Plonka, “On the design and use of internet sinks for network abuse monitoring,” Recent Advances in Intrusion Detection: 7th International Symposium (RAID), pp.146-165, Springer, 2004. 10.1007/978-3-540-30143-1_8
5. [5] D. Moore, “Network telescopes: Tracking denial-of-service attacks and internet worms around the globe,” Proc. 17th Conference on Systems Administration (LISA), USENIX, 2003.
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献