共 15 条
[1]
[Anonymous], 1999, KDD Cup 1999 Data
[3]
CAIDA, 2007, CAIDA DDOS ATT 2007
[4]
Firdous S.N., 2020, IOT MQTT BASED DENIA
[5]
Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol
[J].
2017 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA),
2017,
:748-755
[6]
Hindy H., 2020, INT NETWORKING C
[7]
Johnstone M., 2020, Data Science in Cybersecurity and Cyberthreat Intelligence, P115, DOI DOI 10.1007/978-3-030-38788-4_6
[8]
Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2019, 100
:779-796
[9]
Massachusetts Institute of Technology, 1999, 1999 DARPA INTR DET
[10]
Moustafa N, 2015, 2015 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS)