咨询与建议

限定检索结果

文献类型

  • 9 篇 期刊文献

馆藏范围

  • 9 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9 篇 工学
    • 4 篇 计算机科学与技术...
    • 3 篇 网络空间安全
    • 2 篇 仪器科学与技术
    • 2 篇 信息与通信工程
    • 2 篇 控制科学与工程
    • 2 篇 软件工程
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 9 篇 botnet detection
  • 3 篇 network security
  • 2 篇 internet of thin...
  • 2 篇 machine learning
  • 1 篇 traffic analysis
  • 1 篇 ddqn
  • 1 篇 dqn
  • 1 篇 anomaly detectio...
  • 1 篇 mobile malware
  • 1 篇 machine learning...
  • 1 篇 netflow record
  • 1 篇 domain names
  • 1 篇 defense
  • 1 篇 intrusion detect...
  • 1 篇 graph-based feat...
  • 1 篇 attack
  • 1 篇 graph theory
  • 1 篇 measure centrali...
  • 1 篇 hybrid analysis
  • 1 篇 device identific...

机构

  • 1 篇 department of co...
  • 1 篇 college of compu...
  • 1 篇 state key labora...
  • 1 篇 system security ...
  • 1 篇 department of co...
  • 1 篇 graduate school ...
  • 1 篇 school of inform...
  • 1 篇 department of in...
  • 1 篇 department of el...
  • 1 篇 university of wa...
  • 1 篇 school of inform...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 faculty of compu...
  • 1 篇 department of co...

作者

  • 2 篇 ahmad karim
  • 1 篇 irfan awan
  • 1 篇 nor badrul anuar
  • 1 篇 wang chiheng
  • 1 篇 seong-su yoon
  • 1 篇 khlood shinan
  • 1 篇 yasser alharbi
  • 1 篇 abdulrahman alza...
  • 1 篇 ieck-chae euom
  • 1 篇 seung-ju han
  • 1 篇 khalid alsubhi
  • 1 篇 yutao hu
  • 1 篇 yongxin feng
  • 1 篇 syed adeel ali s...
  • 1 篇 du ruiying
  • 1 篇 m.usman ashraf
  • 1 篇 muhammad shiraz
  • 1 篇 ngai fong law
  • 1 篇 abdullah alharbi
  • 1 篇 cheng xi

语言

  • 9 篇 英文
检索条件"主题词=botnet detection"
9 条 记 录,以下是1-10 订阅
排序:
Review:botnet detection techniques: review, future trends, and issue
收藏 引用
Journal of Zhejiang University-Science C(Computers and Electronics) 2014年 第11期15卷 943-983页
作者: Ahmad KARIM Rosli Bin SALLEH Muhammad SHIRAZ Syed Adeel Ali SHAH Irfan AWAN Nor Badrul ANUAR Faculty of Computer Science and Information Technology University of Malaya Kuala Lumpur Malaysia Department of Computer Science University of Bradford Bradford BD7 1DP UK
In recent years, the Internet has enabled access to widespread remote services in the distributed computing environment; however, integrity of data transmission in the distributed computing platform is hindered by a n... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
The Machine Learning Ensemble for Analyzing Internet of Things Networks:botnet detection and Device Identification
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第11期141卷 1495-1518页
作者: Seung-Ju Han Seong-Su Yoon Ieck-Chae Euom System Security Research Center Chonnam National UniversityGwangju61186Republic of Korea
The rapid proliferation of Internet of Things(IoT)technology has facilitated automation across various ***,this advancement has also resulted in a notable surge in cyberattacks,notably *** a result,research on network... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Optimized Approach to Deep Learning for botnet detection and Classification for Cybersecurity in Internet of Things Environment
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 2331-2349页
作者: Abdulrahman Alzahrani Department of Computer Science and Engineering College of Computer Science and EngineeringUniversity of Hafr Al BatinP.O.Box 1803Hafr Al Batin39524Saudi Arabia
The recent development of the Internet of Things(IoTs)resulted in the growth of IoT-based DDoS *** detection of botnet in IoT systems implements advanced cybersecurity measures to detect and reduce malevolent botnets ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
BotGuard: Lightweight Real-Time botnet detection in Software Defined Networks
收藏 引用
Wuhan University Journal of Natural Sciences 2017年 第2期22卷 103-113页
作者: CHEN Jing CHENG Xi DU Ruiying HU Li WANG Chiheng State Key Laboratory of Software Engineering/School of Computer Wuhan University Wuhan 430072 Hubei China
The distributed detection of botnets may induce heavy computation and communication costs to network devices. Each device in related scheme only has a regional view of Internet, so it is hard to detect botnet comprehe... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Double DQN Method For botnet Traffic detection System
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 509-530页
作者: Yutao Hu Yuntao Zhao Yongxin Feng Xiangyu Ma School of Information Science and Engineering Shenyang Ligong UniversityShenyang110159China Graduate School Shenyang Ligong UniversityShenyang110159China
In the face of the increasingly severe botnet problem on the Internet,how to effectively detect botnet traffic in realtime has become a critical *** the existing deepQnetwork(DQN)algorithminDeep reinforcement learning... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Use of subword tokenization for domain generation algorithm classification
收藏 引用
Cybersecurity 2024年 第2期7卷 1-12页
作者: Sea Ran Cleon Liew Ngai Fong Law University of Waterloo WaterlooCanada Department of Electrical and Electronic Engineering The Hong Kong Polytechnic UniversityKowloonHong Kong
Domain name generation algorithm(DGA)classification is an essential but challenging *** feature-extract-ing machine learning(ML)methods and deep learning(DL)models such as convolutional neural networks and long short-... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Analysis on the time-domain characteristics of botnets control traffic
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2011年 第2期18卷 106-113页
作者: LI Wei-min MIAO Chen LIU Fang LEI Zhen-ming School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing 100876 China
botnets are networks composed with malware-infect ed *** are designed and organized to be controlled by an *** victims are infected through their inappropriate network behaviors in most cases,the Internet protocol(IP... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
BotSward: Centrality Measures for Graph-Based Bot detection Using Machine Learning
收藏 引用
Computers, Materials & Continua 2023年 第1期74卷 693-714页
作者: Khlood Shinan Khalid Alsubhi M.Usman Ashraf Department of Computer Science College Computer Science in Al-LeithUmm Al-Qura UniversityMecca 21421Saudi Arabia Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah 21589Saudi Arabia Department of Computer Science GC Women University SialkotPakistan
The number of botnet malware attacks on Internet devices has grown at an equivalent rate to the number of Internet devices that are connected to the *** detection using machine learning(ML)with flow-based features has... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Learning Model to Detect Android C&C Applications Using Hybrid Analysis
收藏 引用
Computer Systems Science & Engineering 2022年 第12期43卷 915-930页
作者: Attia Qammar Ahmad Karim Yasser Alharbi Mohammad Alsaffar Abdullah Alharbi Department of Information Technology Bahauddin Zakariya UniversityMultan60000Pakistan College of Computer Science and Engineering University of HailHa’il81451Saudi Arabia
Smartphone devices particularly Android devices are in use by billions of people everywhere in the ***,this increasing rate attracts mobile botnet attacks which is a network of interconnected nodes operated through th... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论