Hybrid Connection and Host Clustering for Community Detection in Spatial-Temporal Network Data
暂无分享,去创建一个
[1] Sicco Verwer,et al. MalPaCA: Malware Packet Sequence Clustering and Analysis , 2019, ArXiv.
[2] Darren J. Wilkinson,et al. A review of stochastic block models and extensions for graph clustering , 2019, Applied Network Science.
[3] Aldenor G. Santos,et al. Occurrence of the potent mutagens 2- nitrobenzanthrone and 3-nitrobenzanthrone in fine airborne particles , 2019, Scientific Reports.
[4] Petter Holme,et al. Detecting sequences of system states in temporal networks , 2018, Scientific Reports.
[5] Chun-Yu Wang,et al. BotCluster: A session-based P2P botnet clustering system on NetFlow , 2018, Comput. Networks.
[6] Geoff K. Nicholls,et al. Stochastic Block Models as an Unsupervised Approach to Detect Botnet-Infected Clusters in Networked Data , 2018 .
[7] Chin-Teng Lin,et al. A review of clustering techniques and developments , 2017, Neurocomputing.
[8] Radu State,et al. BotGM: Unsupervised graph mining to detect botnets in traffic flows , 2017, 2017 1st Cyber Security in Networking Conference (CSNet).
[9] Aristides Gionis,et al. Discovering recurring activity in temporal networks , 2017, Data Mining and Knowledge Discovery.
[10] Jing Wang,et al. Botnet Detection Based on Anomaly and Community Detection , 2017, IEEE Transactions on Control of Network Systems.
[11] Mohammad Marufuzzaman,et al. Botnet detection using graph-based feature clustering , 2017, Journal of Big Data.
[12] Emmanuel Abbe,et al. Community detection and stochastic block models: recent developments , 2017, Found. Trends Commun. Inf. Theory.
[13] Tom A. B. Snijders,et al. Stochastic Actor-Oriented Models for Network Dynamics , 2017 .
[14] Pablo Torres,et al. An analysis of Recurrent Neural Networks for Botnet detection behavior , 2016, 2016 IEEE Biennial Congress of Argentina (ARGENCON).
[15] Chin-Tser Huang,et al. Using anomaly detection based techniques to detect HTTP-based botnet C&C traffic , 2016, 2016 IEEE International Conference on Communications (ICC).
[16] Aapo Hyvärinen,et al. Unsupervised Feature Extraction by Time-Contrastive Learning and Nonlinear ICA , 2016, NIPS.
[17] Jean-Benoist Léger. Blockmodels: A R-package for estimating in Latent Block Model and Stochastic Block Model, with various probability functions, with or without covariates , 2016, 1602.07587.
[18] D. Hunter,et al. Temporal Exponential Random Graph Models ( TERGMs ) for dynamic network modeling in statnet , 2015 .
[19] Ali A. Ghorbani,et al. Towards effective feature selection in machine learning-based botnet detection approaches , 2014, 2014 IEEE Conference on Communications and Network Security.
[20] Alejandro Zunino,et al. An empirical comparison of botnet detection methods , 2014, Comput. Secur..
[21] A. Nur Zincir-Heywood,et al. Botnet Behaviour Analysis Using IP Flows: With HTTP Filters Using Classifiers , 2014, 2014 28th International Conference on Advanced Information Networking and Applications Workshops.
[22] V. Kostakos. Temporal Graphs , 2008, Encyclopedia of Social Network Analysis and Mining.
[23] Anil Khandelwal,et al. A Critical Review on Data Clustering in Wireless Network , 2014 .
[24] Rajeev Tripathi,et al. A Review Study of Hierarchical Clustering Algorithms for Wireless Sensor Networks , 2014 .
[25] Ali Feizollah,et al. A Study Of Machine Learning Classifiers for Anomaly-Based Mobile Botnet Detection , 2013 .
[26] Sateesh K. Peddoju,et al. Behaviour analysis of machine learning algorithms for detecting P2P botnets , 2013, 2013 15th International Conference on Advanced Computing Technologies (ICACT).
[27] Kouichi Sakurai,et al. Detecting HTTP-Based Botnet Based on Characteristic of the C & C Session Using by SVM , 2013, 2013 Eighth Asia Joint Conference on Information Security.
[28] Kang Li,et al. PeerRush: Mining for unwanted P2P traffic , 2013, J. Inf. Secur. Appl..
[29] Ricardo J. G. B. Campello,et al. Density-Based Clustering Based on Hierarchical Density Estimates , 2013, PAKDD.
[30] Mrinal Kanti Ghose,et al. A Framework for P2P Botnet Detection Using SVM , 2012, 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.
[31] Futai Zou,et al. Detecting HTTP Botnet with Clustering Network Traffic , 2012, 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing.
[32] Ali A. Ghorbani,et al. Peer to Peer Botnet Detection Based on Flow Intervals , 2012, SEC.
[33] Ali A. Ghorbani,et al. Detecting P2P botnets through network behavior analysis and machine learning , 2011, 2011 Ninth Annual International Conference on Privacy, Security and Trust.
[34] Xiapu Luo,et al. Detecting stealthy P2P botnets using statistical traffic fingerprints , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN).
[35] Nasir D. Memon,et al. Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts , 2010, ACSAC '10.
[36] Rui Xu,et al. Clustering Algorithms in Biomedical Research: A Review , 2010, IEEE Reviews in Biomedical Engineering.
[37] Prateek Mittal,et al. BotGrep: Finding P2P Bots with Structured Graph Analysis , 2010, USENIX Security Symposium.
[38] Toni Giorgino,et al. Computing and Visualizing Dynamic Time Warping Alignments in R: The dtw Package , 2009 .
[39] Zhitang Li,et al. A New Method of P2P Traffic Identification Based on Support Vector Machine at the Host Level , 2009, 2009 International Conference on Information Technology and Computer Science.
[40] Guofei Gu,et al. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection , 2008, USENIX Security Symposium.
[41] István Szabó,et al. On the Validation of Traffic Classification Algorithms , 2008, PAM.
[42] Jean-Loup Guillaume,et al. Fast unfolding of communities in large networks , 2008, 0803.0476.
[43] W. Timothy Strayer,et al. Botnet Detection Based on Network Behavior , 2008, Botnet Detection.
[44] Tony Jung,et al. An introduction to latent class growth analysis and growth mixture modeling. , 2008 .
[45] J. Ioannidis. Why Most Published Research Findings Are False , 2005, PLoS medicine.
[46] Anil K. Jain,et al. Data clustering: a review , 1999, CSUR.
[47] Hans-Peter Kriegel,et al. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.
[48] S. P. Lloyd,et al. Least squares quantization in PCM , 1982, IEEE Trans. Inf. Theory.