共 38 条
- [1] Jeeshitha J., Ramakoteswararao G., Extensive study on ddosbotnet attacks in multiple environments using deep learning and machine learning techniques, ECS transactions, 1, (2022)
- [2] Dao N.N., Phan T.V., Ad U.S., Kim J., Bauschert T., Cho S., Securing heterogeneous iot with intelligent ddos attack behavior learning, IEEE Communications Magazine, (2017)
- [3] Febro A., Xiao H., Spring J., Christianson B., Edge security for sip-enabled iot devices with p4, Computer networks, 11, (2022)
- [4] Gao J., A support vector machine model for computer network security technology, Boletin Tecnico/Technical Bulletin, 55, 12, pp. 564-568, (2017)
- [5] Aoudni Y., Donald C., Farouk A., Sahay K.B., Babu D.V., Tripathi V., Et al., Cloud security based attack detection using transductive learning integrated with hidden markov model, Pattern recognition letters, (2022)
- [6] Midi D., Sultana S., Bertino, Elisa, A system for response and prevention of security incidents in wireless sensor networks, ACM transactions on sensor networks, 13, 1, (2017)
- [7] Liu T., Liu Y., Liu J., Wang L., Xu L., Qiu G., Et al., A bayesian learning based scheme for online dynamic security assessment and preventive control, IEEE Transactions on Power Systems, 35, 5, pp. 4088-4099, (2020)
- [8] Bulrajoul W., James A., Shaikh S., A new architecture for network intrusion detection and prevention, IEEE Access, (2019)
- [9] Zardari Z.A., He J., Pathan M.S., Zhu N., Detection and prevention of jellyfish attacks using knn algorithm and trusted routing scheme in manet, International Journal of Network Security, (2021)
- [10] Farhaoui Y., Design and implementation of an intrusion prevention system, International Journal of Network Security, 19, (2017)