共 30 条
[11]
Davuth N, 2013, INT J SECUR APPL, V7, P51
[12]
Elejla O. E., 2014, J THEORETICAL APPL I, V70
[13]
An empirical comparison of botnet detection methods
[J].
COMPUTERS & SECURITY,
2014, 45
:100-123
[14]
Gu G., 2008, USENIX SEC S
[15]
Gu Guofei, 2008, P 15 ANN NETWORK DIS
[16]
Ismail Z., 2016, SINDH U RES J SURJ S, V48
[17]
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection Approach
[J].
INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015),
2015, 48
:338-346
[18]
Jantan A., 2014, J THEORETICAL APPL I, V10
[19]
Kalaivani P., 2016, IRACST INT J COMPUTE, V6, P2249
[20]
Karasaridis A., 2007, Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, (Berkeley, CA, USA)