共 57 条
[1]
Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
[2]
An N, 2017, PROCEEDINGS OF THE 2017 12TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE), P47, DOI 10.1109/MALWARE.2017.8323956
[3]
[Anonymous], 2015, ACS SYM SER
[4]
[Anonymous], 2014, Indian J. Comput. Sci. Eng. (IJCSE)
[5]
Learning Representations for Log Data in Cybersecurity
[J].
CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING (CSCML 2017),
2017, 10332
:250-268
[6]
Detecting botnet by using particle swarm optimization algorithm based on voting system
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2020, 107
:95-111
[7]
Bartlett G, 2007, IMC'07: PROCEEDINGS OF THE 2007 ACM SIGCOMM INTERNET MEASUREMENT CONFERENCE, P57