共 112 条
- [1] Antonakakis M., April T., Bailey M., Bernhard M., Bursztein E., Cochran J., Durumeric Z., Halderman J.A., Invernizzi L., Kallitsis M., Et al., Understanding the mirai botnet, 26Th USENIX Security Symposium (USENIX Security 17), pp. 1093-1110, (2017)
- [2] Alabdulatif A., Rizvi S.S.H., Hashmani M.A., Optimal machine learning models for kitsune to detect mirai botnet malware attack, J Hun Univ Nat Sci, 48, 6, (2021)
- [3] Qiao Y., Zhang B., Zhang W., Sangaiah A.K., Wu H., Dga domain name classification method based on long short-term memory with attention mechanism, Appl Sci, 9, 20, (2019)
- [4] Baddi Y., Sebbar A., Zkik K., Maleh Y., Bensalah F., Boulmalf M., Msdn-iot multicast group communication in iot based on software defined networking, J Reliab Intell Environ, 10, 1, pp. 93-104, (2024)
- [5] Himthani P., Dubey G.P., Sharma B.M., Taneja A., Big data privacy and challenges for machine learning, . In: 2020 Fourth International Conference on I-SMAC (Iot in Social, Mobile, Analytics and Cloud) (I-SMAC)., pp. 707-713, (2020)
- [6] Aburass S., Quantifying Overfitting: Introducing the Overfitting Index, (2023)
- [7] Wazid M., Das A.K., Chamola V., Park Y., Uniting cyber security and machine learning: advantages, challenges and future research, ICT Express, 8, 3, pp. 313-321, (2022)
- [8] Eslahi M., Salleh R.B., Anuar N.B., Bots and botnets: An overview of characteristics, detection and challenges, 2012 IEEE International Conference on Control System, Computing and Engineering, pp. 349-354, (2012)
- [9] Walvekar H.S., Kanade A., Gautam S., Jagtap S., Bots, botnets and zombies: anatomy, inhibitory measures and threat prevention techniques, Int J Sci Res Comput Sci Eng Inf Technol, 8, pp. 351-356, (2022)
- [10] Maigida A.M., Abdulhamid S.M., Olalere M., Alhassan J.K., Chiroma H., Dada E.G., Systematic literature review and metadata analysis of ransomware attacks and detection mechanisms, J Reliab Intell Environ, 5, pp. 67-89, (2019)