共 50 条
- [2] Detecting and blocking malicious traffic caused by IRC protocol based botnets [J]. 2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 485 - 489
- [3] Detecting APT Malware Infections Based on Malicious DNS and Traffic Analysis [J]. IEEE ACCESS, 2015, 3 : 1132 - 1142
- [4] Detecting IoT Malicious Traffic based on Autoencoder and Convolutional Neural Network [J]. 2019 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2019,
- [5] Escape method of malicious traffic based on backdoor attack [J]. Tongxin Xuebao/Journal on Communications, 2024, 45 (04): : 73 - 83
- [6] Detecting unknown HTTP-based malicious communication behavior via generated adversarial flows and hierarchical traffic features [J]. Computers and Security, 2022, 121
- [8] METHOD FOR DETECTING THE OBFUSCATED MALICIOUS CODE BASED ON BEHAVIOR CONNECTION [J]. 2014 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (CCIS), 2014, : 234 - 240
- [9] A Detecting Method for Malicious Mobile Application Based on Incremental SVM [J]. PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 1246 - 1250
- [10] A Malicious Domains Detection Method Based on File Sandbox Traffic [J]. IEEE NETWORK, 2023, 37 (06): : 182 - 188