共 25 条
[1]
Alkasassbeh M, 2016, INT J ADV COMPUT SC, V7, P436
[2]
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[3]
Bhuyan M.H., 2015, International Journal of Network Security, V17, P683
[4]
Towards the Development of a Realistic Multidimensional IoT Profiling Dataset
[J].
2022 19TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY & TRUST (PST),
2022,
[5]
Draper-Gil Gerard, 2016, ICISSP 2016. 2nd International Conference on Information Systems Security and Privacy. Proceedings, P407
[7]
An empirical comparison of botnet detection methods
[J].
COMPUTERS & SECURITY,
2014, 45
:100-123
[8]
Toward the Protection of IoT Networks: Introducing the LATAM-DDoS-IoT Dataset
[J].
IEEE ACCESS,
2022, 10
:106909-106920
[9]
Gringoli F, 2009, COMPUT COMMUN REV, V39, P12, DOI DOI 10.1145/1629607.1629610