共 45 条
[1]
Abou Daya A, 2019, 2019 IFIP/IEEE SYMPOSIUM ON INTEGRATED NETWORK AND SERVICE MANAGEMENT (IM), P144
[2]
Aggarwal C., 2012, ACM SIGKDD EXPLORATI, V14, P49, DOI [DOI 10.1145/2481244.2481252, 10.1145/2481244.2481252]
[3]
Al-Duwairi Basheer, 2010, Proceedings of the Fifth International Conference on Internet Monitoring and Protection (ICIMP 2010), P16, DOI 10.1109/ICIMP.2010.11
[4]
Albanese M., 2019, Adaptive Cyber Defenses for Botnet Detection and Mitigation, P156
[5]
A survey of botnet detection based on DNS
[J].
NEURAL COMPUTING & APPLICATIONS,
2017, 28 (07)
:1541-1558
[6]
Amini Pedram, 2014, Adv. Comput. Sci.: Int. J., V3, P139
[7]
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[8]
Arshad S., 2011, 2011 IEEE International Conference on Computer Applications and Industrial Electronics (ICCAIE 2011), P564, DOI 10.1109/ICCAIE.2011.6162198
[9]
Cluster-GCN: An Efficient Algorithm for Training Deep and Large Graph Convolutional Networks
[J].
KDD'19: PROCEEDINGS OF THE 25TH ACM SIGKDD INTERNATIONAL CONFERENCCE ON KNOWLEDGE DISCOVERY AND DATA MINING,
2019,
:257-266