Author:
Savenko Bohdan,Lysenko Sergii,Bobrovnikova Kira,Savenko Oleg,Markowsky George
Reference40 articles.
1. Attractiveness study of honeypots and honeynets in internet threat detection;sochor;Communications in Computer and Information Science,2015
2. Intrusion Detection System with Recursive Feature Elimination by Using Random Forest and Deep Learning Classifier
3. Technique for cyberattacks detection based on DNS traffic analysis;lysenko;CEUR-WS,2020
4. A Cyberattacks Detection Technique Based on Evolutionary Algorithms
5. DDoS Botnet detection technique based on the use of the semi-supervised fuzzy c-means clustering;lysenko;CEUR-WS ISSN 1613–0073 (Scopus),2018
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Exploring Cyber Threats on Data Engineering Techniques for Identifying Security Breaches;Advances in Computer and Electrical Engineering;2024-08-30
2. Real-time Threat Detection Strategies for Resource-constrained Devices;2024 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT);2024-04-29
3. Challenges Towards VR Technology: VR Architecture Optimization;2023 13th International Conference on Dependable Systems, Services and Technologies (DESSERT);2023-10-13
4. Social Engineering Attacks Detection Approach;2023 13th International Conference on Dependable Systems, Services and Technologies (DESSERT);2023-10-13
5. Intelligent Information System for Product Promotion in Internet Market;Applied Sciences;2023-08-24