Recommender System based on Empirical Study of Geolocated Clustering and Prediction Services for Botnets Cyber-Intelligence in Malaysia
暂无分享,去创建一个
[1] Michael Schukat,et al. Using analysis of temporal variances within a honeypot dataset to better predict attack type probability , 2017, 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST).
[2] Ladislav Hluchý,et al. A heuristics approach to mine behavioural data logs in mobile malware detection system , 2018, Data Knowl. Eng..
[3] Guang Cheng,et al. Detecting domain-flux botnet based on DNS traffic features in managed network , 2016, Secur. Commun. Networks.
[4] Kyle Sanders,et al. WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS , 2014 .
[5] Gianluca Stringhini,et al. What's Your Major Threat? On the Differences between the Network Behavior of Targeted and Commodity Malware , 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES).
[6] Zulaiha Ali Othman,et al. Improvement Anomaly Intrusion Detection using Fuzzy-ART Based on K-means based on SNC Labeling , 2011 .
[7] Kathleen M. Carley,et al. An empirical study of global malware encounters , 2015, HotSoS.
[8] Bud Mishra,et al. Agent-based trace learning in a recommendation-verification system for cybersecurity , 2014, 2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE).
[9] Paulo Salvador,et al. Statistical Characterization of the Botnets C&C Traffic , 2012 .
[10] Siti Norul Huda Sheikh Abdullah,et al. Additional Feet-on-the-Street Deployment Method for Indexed Crime Prevention Initiative , 2018 .
[11] Khairuddin Omar,et al. A Survey on Malware Analysis Techniques: Static, Dynamic, Hybrid and Memory Analysis , 2018, International Journal on Advanced Science, Engineering and Information Technology.
[12] Mohammad S. Obaidat,et al. ProIDS: Probabilistic Data Structures Based Intrusion Detection System for Network Traffic Monitoring , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[13] Marini Abu Bakar,et al. A Framework for Cybersecurity Strategy for Developing Countries: Case Study of Afghanistan , 2015 .