共 40 条
[1]
Tahaei H., Afifi F., Asemi A., Zaki F., Anuar N.B., The rise of traffic classification in IoT networks: A survey, Journal of Network and Computer Applications, 154, (2020)
[2]
Acampora G., Bernardi M.L., Cimitile M., Tortora G., Vitiello A., A Fuzzy Clustering-based Approach to Study Malware Phylogeny
[3]
Bernardi M., Cimitile M., Martinelli F., Mercaldo F., Keystroke Analysis for User Identification Using Deep Neural Networks
[4]
Bernardi M.L., Cimitile M., Distante D., Martinelli F., Mercaldo F., Dynamic malware detection and phylogeny analysis using process mining, International Journal of Information Security, 18, 3, pp. 257-284, (2019)
[5]
Perrone G., Vecchio M., Pecori R., Giaffreda R., The Day after Mirai: A Survey on MQTT Security Solutions after the Largest Cyber-attack Carried out through An Army of IoT Devices, pp. 246-253
[6]
Bernardi M.L., Cimitile M., Martinelli F., Mercaldo F., Game Bot Detection in Online Role Player Game through Behavioural Features, pp. 50-60
[7]
Calabretta M., Pecori R., Veltri L., A Token-based Protocol for Securing MQTT Communications
[8]
Pecori R., Tayebi A., Vannucci A., Veltri L., Iot Attack Detection with Deep Learning Analysis
[9]
Aversano L., Bernardi M.L., Cimitile M., Pecori R., A systematic review on deep learning approaches for IoT security, Computer Science Review, (2021)
[10]
Balin M.F., Abid A., Zou J., Chaudhuri K., Salakhutdinov R., Concrete autoencoders: Differentiable feature selection and reconstruction, Proceedings of the 36th International Conference on Machine Learning, pp. 444-453, (2019)