共 50 条
- [41] Can We Beat Legitimate Cyber Behavior Mimicking Attacks from Botnets? 2012 PROCEEDINGS IEEE INFOCOM, 2012, : 2851 - 2855
- [42] GADFly: A Fast and Robust Algorithm to Detect P2P Botnets in Communication Graphs 2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
- [43] FROM CYBERCRIME TO CYBORG CRIME: BOTNETS AS HYBRID CRIMINAL ACTOR-NETWORKS BRITISH JOURNAL OF CRIMINOLOGY, 2015, 55 (03): : 578 - 595
- [44] DeBot: A novel network-based mechanism to detect exfiltration by architectural stealthy botnets SECURITY AND PRIVACY, 2018, 1 (06):
- [46] A novel method of mining network flow to detect P2P botnets Peer-to-Peer Networking and Applications, 2014, 7 : 645 - 654
- [47] IRC botnets' homology identifying method based on dynamic time warping distance of communication feature curves Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2012, 49 (03): : 481 - 490
- [48] Mozi IoT Malware and Its Botnets: From Theory To Real-World Observations 2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2021), 2021, : 698 - 703
- [49] IRC botnets' homology identifying method based on improved LB_PAA distance of communication characteristic curves 2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 360 - 365
- [50] Proactive Detection of Botnets with Intended Forceful Infections from Multiple Malware Collecting Channels FUTURE INFORMATION TECHNOLOGY, PT 1, 2011, 184 : 29 - 36