Botnet Defense System and Its Basic Strategy Against Malicious Botnet
Yamaguchi, S.. 2020. Botnet Defense System and Its Basic Strategy Against Malicious Botnet. 2020 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan). :1—2.
View ArticleMobile Botnet Detection: A Deep Learning Approach Using Convolutional Neural...
Yerima, S. Y., Alzaylaee, M. K.. 2020. Mobile Botnet Detection: A Deep Learning Approach Using Convolutional Neural Networks. 2020 International Conference on Cyber Situational Awareness, Data...
View ArticleRobust Early Stage Botnet Detection using Machine Learning
Muhammad, A., Asad, M., Javed, A. R.. 2020. Robust Early Stage Botnet Detection using Machine Learning. 2020 International Conference on Cyber Warfare and Security (ICCWS). :1—6.
View ArticleAnalyzing Variation Among IoT Botnets Using Medium Interaction Honeypots
Lingenfelter, B., Vakilinia, I., Sengupta, S.. 2020. Analyzing Variation Among IoT Botnets Using Medium Interaction Honeypots. 2020 10th Annual Computing and Communication Workshop and Conference...
View ArticleReliability Analysis of Concurrent Data based on Botnet Modeling
Cui, L., Huang, D., Zheng, X.. 2020. Reliability Analysis of Concurrent Data based on Botnet Modeling. 2020 Fourth International Conference on Inventive Systems and Control (ICISC). :825—828.
View ArticleIdentification of Botnet Activity in IoT Network Traffic Using Machine Learning
Hegde, M., Kepnang, G., Mazroei, M. Al, Chavis, J. S., Watkins, L.. 2020. Identification of Botnet Activity in IoT Network Traffic Using Machine Learning. 2020 International Conference on Intelligent...
View ArticleAI-Powered Honeypots for Enhanced IoT Botnet Detection
Memos, V. A., Psannis, K. E.. 2020. AI-Powered Honeypots for Enhanced IoT Botnet Detection. 2020 3rd World Symposium on Communication Engineering (WSCE). :64—68.
View ArticleIoT Botnet Malware Classification Using Weka Tool and Scikit-learn Machine...
Susanto, Stiawan, D., Arifin, M. A. S., Idris, M. Y., Budiarto, R.. 2020. IoT Botnet Malware Classification Using Weka Tool and Scikit-learn Machine Learning. 2020 7th International Conference on...
View ArticleA Two-stage P2P Botnet Detection Method Based on Statistical Features
Zhou, B., He, J., Tan, M.. 2020. A Two-stage P2P Botnet Detection Method Based on Statistical Features. 2020 IEEE 11th International Conference on Software Engineering and Service Science (ICSESS)....
View ArticleTowards Data-Driven Characterization of Brute-Force Attackers
Wilkens, F., Fischer, M.. 2020. Towards Data-Driven Characterization of Brute-Force Attackers. 2020 IEEE Conference on Communications and Network Security (CNS). :1—9.
View ArticleA Conceptual Direction on Automatically Evolving Computer Malware using...
Murali, R., Velayutham, C. S.. 2020. A Conceptual Direction on Automatically Evolving Computer Malware using Genetic and Evolutionary Algorithms. 2020 International Conference on Inventive...
View ArticleIoTCMal: Towards A Hybrid IoT Honeypot for Capturing and Analyzing Malware
Wang, B., Dou, Y., Sang, Y., Zhang, Y., Huang, J.. 2020. IoTCMal: Towards A Hybrid IoT Honeypot for Capturing and Analyzing Malware. ICC 2020 - 2020 IEEE International Conference on Communications...
View ArticleAttacking Key Management in Ransomware
Bajpai, P., Enbody, R.. 2020. Attacking Key Management in Ransomware. IT Professional. 22:21—27.
View ArticleThink Smart, Play Dumb: Analyzing Deception in Hardware Trojan Detection...
Das, T., Eldosouky, A. R., Sengupta, S.. 2020. Think Smart, Play Dumb: Analyzing Deception in Hardware Trojan Detection Using Game Theory. 2020 International Conference on Cyber Security and...
View ArticleA Deep Learning-based Malware Hunting Technique to Handle Imbalanced Data
Moti, Z., Hashemi, S., Jahromi, A. N.. 2020. A Deep Learning-based Malware Hunting Technique to Handle Imbalanced Data. 2020 17th International ISC Conference on Information Security and Cryptology...
View ArticleDeepGuard: Deep Generative User-behavior Analytics for Ransomware Detection
Ganfure, G. O., Wu, C.-F., Chang, Y.-H., Shih, W.-K.. 2020. DeepGuard: Deep Generative User-behavior Analytics for Ransomware Detection. 2020 IEEE International Conference on Intelligence and...
View ArticleAn I/O Request Packet (IRP) Driven Effective Ransomware Detection Scheme...
Ayub, M. A., Continella, A., Siraj, A.. 2020. An I/O Request Packet (IRP) Driven Effective Ransomware Detection Scheme using Artificial Neural Network. 2020 IEEE 21st International Conference on...
View ArticleDynamic information-theoretic measures for security informatics
Colbaugh, R., Glass, K., Bauer, T.. 2013. Dynamic information-theoretic measures for security informatics. 2013 IEEE International Conference on Intelligence and Security Informatics. :45–49.
View Article
More Pages to Explore .....