An enhanced mechanism for detection of Domain Name System-based distributed reflection denial of service attacks depending on modified metaheuristic algorithms and adaptive thresholding techniques
暂无分享,去创建一个
[1] Evolving Dynamic Fuzzy Clustering (EDFC) to Enhance DRDoS_DNS Attacks Detection Mechnism , 2022, International Journal of Intelligent Engineering and Systems.
[2] V. Dora,et al. Optimal feature selection with CNN-feature learning for DDoS attack detection using meta-heuristic-based LSTM , 2022, International Journal of Intelligent Robotics and Applications.
[3] Ramchandra S. Mangrulkar,et al. TaxoDaCML: Taxonomy based Divide and Conquer using machine learning approach for DDoS attack classification , 2021, Int. J. Inf. Manag. Data Insights.
[4] Niall M. Adams,et al. Multi-type relational clustering for enterprise cyber-security networks , 2021, Pattern Recognit. Lett..
[5] Kazim Yildiz,et al. Detection of DDoS attacks with feed forward based deep neural network model , 2021, Expert Syst. Appl..
[6] Ivan Zelinka,et al. Applications of swarm intelligence algorithms countering the cyber threats , 2020, GECCO Companion.
[7] Florian Skopik,et al. System log clustering approaches for cyber security applications: A survey , 2020, Comput. Secur..
[8] Saurabh Singh,et al. SMO-DNN: Spider Monkey Optimization and Deep Neural Network Hybrid Classifier Model for Intrusion Detection , 2020, Electronics.
[9] Awais Ahmad,et al. Nature-inspired algorithm-based secure data dissemination framework for smart city networks , 2020, Neural Computing and Applications.
[10] Yogesh Kumar Dwivedi,et al. Prevention of cybercrimes in smart cities of India: from a citizen's perspective , 2019, Inf. Technol. People.
[11] Aida Mustapha,et al. Comprehensive Review of Artificial Intelligence and Statistical Approaches in Distributed Denial of Service Attack and Defense Methods , 2019, IEEE Access.
[12] Mahmood Hussain Shah,et al. Information security management needs more holistic approach: A literature review , 2016, Int. J. Inf. Manag..
[13] Erhan Guven,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.
[14] Yudong Zhang,et al. A Comprehensive Survey on Particle Swarm Optimization Algorithm and Its Applications , 2015 .
[15] Mourad Debbabi,et al. Inferring distributed reflection denial of service attacks from darknet , 2015, Comput. Commun..
[16] Julian Jang,et al. A survey of emerging threats in cybersecurity , 2014, J. Comput. Syst. Sci..
[17] Rutvij H. Jhaveri,et al. Comparing and Analyzing Applications of Intelligent Techniques in Cyberattack Detection , 2021, Secur. Commun. Networks.
[18] Ricardo Soto,et al. Metaheuristic Techniques in Attack and Defense Strategies for Cybersecurity: A Systematic Review , 2021 .
[19] Dejan Dovzan,et al. Large-scale cyber attacks monitoring using Evolving Cauchy Possibilistic Clustering , 2018, Appl. Soft Comput..