咨询与建议

限定检索结果

文献类型

  • 147 篇 期刊文献
  • 137 篇 会议
  • 6 篇 学位论文

馆藏范围

  • 290 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 275 篇 工学
    • 231 篇 计算机科学与技术...
    • 106 篇 电气工程
    • 93 篇 信息与通信工程
    • 34 篇 软件工程
    • 18 篇 控制科学与工程
    • 13 篇 网络空间安全
    • 11 篇 电子科学与技术(可...
    • 6 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 2 篇 机械工程
    • 2 篇 动力工程及工程热...
    • 1 篇 石油与天然气工程
    • 1 篇 生物医学工程(可授...
  • 26 篇 管理学
    • 22 篇 管理科学与工程(可...
    • 4 篇 公共管理
    • 3 篇 图书情报与档案管...
    • 1 篇 工商管理
  • 14 篇 理学
    • 8 篇 数学
    • 4 篇 化学
    • 3 篇 生物学
    • 3 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 4 篇 医学
    • 2 篇 公共卫生与预防医...
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
  • 3 篇 文学
    • 2 篇 新闻传播学
    • 1 篇 外国语言文学
  • 2 篇 法学
    • 2 篇 社会学
  • 1 篇 经济学
  • 1 篇 军事学
    • 1 篇 军队指挥学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 290 篇 botnet detection
  • 73 篇 machine learning
  • 51 篇 botnet
  • 47 篇 network security
  • 26 篇 internet of thin...
  • 20 篇 malware
  • 18 篇 deep learning
  • 17 篇 security
  • 16 篇 traffic analysis
  • 16 篇 feature extracti...
  • 15 篇 intrusion detect...
  • 15 篇 anomaly detectio...
  • 11 篇 iot
  • 11 篇 cybersecurity
  • 9 篇 internet of thin...
  • 8 篇 netflow
  • 8 篇 dns
  • 7 篇 feature selectio...
  • 6 篇 clustering
  • 6 篇 honeypot

机构

  • 5 篇 tarbiat modares ...
  • 3 篇 manchester metro...
  • 3 篇 univ tokyo
  • 3 篇 dalhousie univ f...
  • 3 篇 nanjing univ pos...
  • 3 篇 zarqa univ fac i...
  • 3 篇 ntt ltd sunnyval...
  • 2 篇 de montfort univ...
  • 2 篇 univ victoria ec...
  • 2 篇 zhongguancun lab...
  • 2 篇 univ teknol mara...
  • 2 篇 chinese acad sci...
  • 2 篇 shahrood univ te...
  • 2 篇 princess nourah ...
  • 2 篇 univ chinese aca...
  • 2 篇 future univ egyp...
  • 2 篇 bbn technol camb...
  • 2 篇 beijing jiaotong...
  • 2 篇 symantec res lab...
  • 2 篇 univ luxembourg ...

作者

  • 7 篇 lysenko sergii
  • 7 篇 savenko oleg
  • 6 篇 abadi mahdi
  • 6 篇 eslahi meisam
  • 5 篇 kryshchuk andrii
  • 5 篇 ghorbani ali a.
  • 5 篇 bobrovnikova kir...
  • 4 篇 hostiadi dandy p...
  • 4 篇 singh maninder
  • 4 篇 kamiya kazunori
  • 4 篇 naseri maryam va...
  • 4 篇 zincir-heywood a...
  • 4 篇 takahashi kenji
  • 4 篇 hu bo
  • 4 篇 ahmad tohari
  • 4 篇 kaur sanmeet
  • 4 篇 tahir n. m.
  • 4 篇 hashim h.
  • 4 篇 singh manmeet
  • 4 篇 alauthman mohamm...

语言

  • 281 篇 英文
  • 5 篇 其他
  • 5 篇 中文
  • 1 篇 俄文
检索条件"主题词=Botnet detection"
290 条 记 录,以下是1-10 订阅
排序:
botnet detection and information leakage mitigation with differential privacy under generative adversarial networks
收藏 引用
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS 2025年 第2期28卷 1-16页
作者: Feizi, Sanaz Ghaffari, Hamidreza Islamic Azad Univ Dept Comp Sci Ferdows Branch Ferdows Iran
botnets are a serious threat to computer networks. New botnets are created with the aim of evading detection by making modifications. The proposed methods are insufficient for detecting modified botnets. A Generative ... 详细信息
来源: 评论
Ensemble Network Graph-Based Classification for botnet detection Using Adaptive Weighting and Feature Extraction
收藏 引用
IEEE ACCESS 2025年 13卷 31183-31204页
作者: Putra, Muhammad Aidiel Rachman Ahmad, Tohari Hostiadi, Dandy Pramana Ijtihadie, Royyana Muslim Inst Teknol Sepuluh Nopember Dept Informat Surabaya 60111 Indonesia Inst Teknol & Bisnis STIKOM Bali Dept Magister Informat Syst Denpasar 80234 Indonesia
The number of cybersecurity threats increases every year due to the rapid improvement of methods and tools used by hackers to infect devices. These threats form a network, which is called a botnet, to send and receive... 详细信息
来源: 评论
A new a flow-based approach for enhancing botnet detection using convolutional neural network and long short-term memory
收藏 引用
KNOWLEDGE AND INFORMATION SYSTEMS 2025年 1-32页
作者: Asadi, Mehdi Heidari, Arash Navimipour, Nima Jafari Islamic Azad Univ Dept Comp Engn Khameneh Branch Khameneh Iran Halic Univ Dept Software Engn TR-34060 Istanbul Turkiye Istanbul Atlas Univ Fac Engn & Nat Sci Dept Comp Engn Istanbul Turkiye Qatar Univ Dept Comp Sci & Engn Doha Qatar Kadir Has Univ Fac Engn & Nat Sci Dept Comp Engn Istanbul Turkiye Natl Yunlin Univ Sci & Technol Future Technol Res Ctr Touliu Yunlin Taiwan Western Caspian Univ Res Ctr High Technol & Innovat Engn Baku Azerbaijan
Despite the growing research and development of botnet detection tools, an ever-increasing spread of botnets and their victims is being witnessed. Due to the frequent adaptation of botnets to evolving responses offere... 详细信息
来源: 评论
Method for botnet detection with small labelled samples based on graph neural network
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY 2025年 第1-2期26卷 91-108页
作者: Zhu, Junjing Lin, Honggang Chengdu Univ Informat Technol Xin Gu Ind Coll Sch Cybersecur Chengdu 610225 Peoples R China
Deep learning-based botnet detection techniques need to be trained using a large number of labelled samples, which is incompatible with the current environment where botnets occur in short cycles and mutate quickly. T... 详细信息
来源: 评论
Two-Stage botnet detection Method Based on Feature Selection for Industrial Internet of Things
收藏 引用
IET INFORMATION SECURITY 2025年 第1期2025卷
作者: Shu, Jian Lu, Jiazhong Chengdu Univ Informat Technol Sch Cybersecur Chengdu 610225 Sichuan Peoples R China Chengdu Univ Informat Technol Adv Cryptog & Syst Secur Key Lab Sichuan Prov Chengdu 610225 Peoples R China SUGON Ind Control & Secur Ctr Chengdu 610225 Peoples R China
Industrial control systems (ICSs) increasingly leverage the industrial internet of things (IIoTs) for sensor-based automation, enhancing operational efficiency. However, the rapid expansion of the IIoTs brings with it... 详细信息
来源: 评论
A privacy-enhanced framework with deep learning for botnet detection
收藏 引用
CYBERSECURITY 2025年 第1期8卷 1-14页
作者: Wu, Guangli Wang, Xingyue Gansu Univ Polit Sci & Law Sch Cyberspace Secur Lanzhou 730070 Peoples R China
A botnet is a group of hijacked devices that conduct various cyberattacks, which is one of the most dangerous threats on the internet. Organizations or individuals use network traffic to mine botnet communication beha... 详细信息
来源: 评论
An explainable botnet detection model based on lightweight graph neural networks
收藏 引用
INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING 2025年 第2期28卷 219-231页
作者: He, Guofeng Zhu, Jianghua Shi, Yinong Yan, Ke Zheng, Xu Univ Elect Sci & Technol China Sch Informat & Software Engn Chengdu Peoples R China Univ Elect Sci & Technol China Shenzhen Inst Adv Study Chengdu Peoples R China Univ Elect Sci & Technol China Sch Comp Sci & Engn Chengdu Peoples R China KASH Inst Elect & Informat Ind Kashi Peoples R China
botnets represent a significant threat to the security of the current internet network environment. They can be employed to carry out various malicious activities, not only impairing the performance and security of in... 详细信息
来源: 评论
Deeply fused flow and topology features for botnet detection based on a pretrained GCN
收藏 引用
COMPUTER COMMUNICATIONS 2025年 233卷
作者: Meng, Xiaoyuan Lang, Bo Yan, Yuhao Liu, Yanxi Beihang Univ State Key Lab Software Dev Environm XueYuan Rd Beijing 100191 Beijing Peoples R China Zhongguancun Lab Beijing Peoples R China China Mobile Informat Technol Co Ltd Hangzhou Peoples R China
The characteristics of botnets are mainly reflected in their network behaviors and the intercommunication relationships among their bots. The existing botnet detection methods typically use only one kind of feature, i... 详细信息
来源: 评论
Explainable artificial intelligence for botnet detection in internet of things
收藏 引用
SCIENTIFIC REPORTS 2025年 第1期15卷 1-17页
作者: Saied, Mohamed Guirguis, Shawkat Alexandria Univ Inst Grad Studies & Res 832 Elhorrya Rd Alexandria 21526 Egypt
The proliferation of internet of things (IoT) devices has led to unprecedented connectivity and convenience. However, this increased interconnectivity has also introduced significant security challenges, particularly ... 详细信息
来源: 评论
botnet detection via mining of traffic flow characteristics
收藏 引用
COMPUTERS & ELECTRICAL ENGINEERING 2016年 50卷 91-101页
作者: Kirubavathi, G. Anitha, R. PSG Coll Technol Dept Appl Math & Computat Sci Coimbatore Tamil Nadu India
botnet is one of the most serious threats to cyber security as it provides a distributed platform for several illegal activities. Regardless of the availability of numerous methods proposed to detect botnets, still it... 详细信息
来源: 评论