咨询与建议

限定检索结果

文献类型

  • 147 篇 期刊文献
  • 137 篇 会议
  • 6 篇 学位论文

馆藏范围

  • 290 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 274 篇 工学
    • 231 篇 计算机科学与技术...
    • 106 篇 电气工程
    • 93 篇 信息与通信工程
    • 34 篇 软件工程
    • 18 篇 控制科学与工程
    • 13 篇 网络空间安全
    • 11 篇 电子科学与技术(可...
    • 6 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 2 篇 机械工程
    • 2 篇 动力工程及工程热...
    • 1 篇 石油与天然气工程
    • 1 篇 生物医学工程(可授...
  • 24 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 4 篇 公共管理
    • 3 篇 图书情报与档案管...
    • 1 篇 工商管理
  • 13 篇 理学
    • 8 篇 数学
    • 4 篇 化学
    • 3 篇 生物学
    • 3 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 4 篇 医学
    • 2 篇 公共卫生与预防医...
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
  • 3 篇 文学
    • 2 篇 新闻传播学
    • 1 篇 外国语言文学
  • 2 篇 法学
    • 2 篇 社会学
  • 1 篇 军事学
    • 1 篇 军队指挥学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 290 篇 botnet detection
  • 73 篇 machine learning
  • 51 篇 botnet
  • 47 篇 network security
  • 26 篇 internet of thin...
  • 20 篇 malware
  • 18 篇 deep learning
  • 17 篇 security
  • 16 篇 traffic analysis
  • 16 篇 feature extracti...
  • 15 篇 intrusion detect...
  • 15 篇 anomaly detectio...
  • 11 篇 iot
  • 11 篇 cybersecurity
  • 9 篇 internet of thin...
  • 8 篇 netflow
  • 8 篇 dns
  • 7 篇 feature selectio...
  • 6 篇 clustering
  • 6 篇 honeypot

机构

  • 5 篇 tarbiat modares ...
  • 3 篇 manchester metro...
  • 3 篇 univ tokyo
  • 3 篇 dalhousie univ f...
  • 3 篇 nanjing univ pos...
  • 3 篇 zarqa univ fac i...
  • 3 篇 ntt ltd sunnyval...
  • 2 篇 de montfort univ...
  • 2 篇 univ victoria ec...
  • 2 篇 zhongguancun lab...
  • 2 篇 univ teknol mara...
  • 2 篇 chinese acad sci...
  • 2 篇 shahrood univ te...
  • 2 篇 princess nourah ...
  • 2 篇 univ chinese aca...
  • 2 篇 future univ egyp...
  • 2 篇 bbn technol camb...
  • 2 篇 beijing jiaotong...
  • 2 篇 symantec res lab...
  • 2 篇 univ luxembourg ...

作者

  • 7 篇 lysenko sergii
  • 7 篇 savenko oleg
  • 6 篇 abadi mahdi
  • 6 篇 eslahi meisam
  • 5 篇 kryshchuk andrii
  • 5 篇 ghorbani ali a.
  • 5 篇 bobrovnikova kir...
  • 4 篇 hostiadi dandy p...
  • 4 篇 singh maninder
  • 4 篇 kamiya kazunori
  • 4 篇 naseri maryam va...
  • 4 篇 zincir-heywood a...
  • 4 篇 takahashi kenji
  • 4 篇 hu bo
  • 4 篇 ahmad tohari
  • 4 篇 kaur sanmeet
  • 4 篇 tahir n. m.
  • 4 篇 hashim h.
  • 4 篇 singh manmeet
  • 4 篇 alauthman mohamm...

语言

  • 281 篇 英文
  • 5 篇 其他
  • 5 篇 中文
  • 1 篇 俄文
检索条件"主题词=Botnet detection"
290 条 记 录,以下是81-90 订阅
排序:
A Novel botnet detection Method Based on Preprocessing Data Packet by Graph Structure Clustering  8
A Novel Botnet Detection Method Based on Preprocessing Data ...
收藏 引用
8th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
作者: Kong, Xinling Chen, Yonghong Tian, Hui Wang, Tian Cai, Yiqiao Chen, Xin Huaqiao Univ Coll Comp Sci & Technol Xiamen Peoples R China
botnets are one of the most serious threats in the Internet, and thus the effective detection of the botnet becomes more and more important. In this paper, inspired by IP tracing technology, we propose a novel botnet ... 详细信息
来源: 评论
Automatically Generating Payload-based Models for botnet detection
Automatically Generating Payload-based Models for Botnet Det...
收藏 引用
2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity)
作者: Lee, Chung-Nan Chou, Fred Chen, C. M. Natl Sun Yat Sen Univ Dept Comp Sci & Engn Kaohsiung Taiwan Natl Sun Yat Sen Univ Dept Informat Management Kaohsiung Taiwan
In recent years, botnet has become a popular technique for deploying cybercrime because it is hard to be prevented and easily cause devastating loss. Therefore, in this paper, we proposed a novel approach that can aut... 详细信息
来源: 评论
An Active and Dynamic botnet detection Approach to Track Hidden Concept Drift  19th
An Active and Dynamic Botnet Detection Approach to Track Hid...
收藏 引用
19th International Conference on Information and Communications Security (ICICS)
作者: Wang, Zhi Tian, Meiqi Jia, Chunfu Nankai Univ Coll Comp & Control Engn Tianjin 300350 Peoples R China
Nowadays, machine learning has been widely used as a core component in botnet detection systems. However, the assumption of machine learning algorithm is that the underlying botnet data distribution is stable for trai... 详细信息
来源: 评论
SocialBotHunter: botnet detection in Twitter-like Social Networking Services Using Semi-Supervised Collective Classification  16
SocialBotHunter: Botnet Detection in Twitter-like Social Net...
收藏 引用
16th IEEE Int Conf on Dependable, Autonom and Secure Comp/16th IEEE Int Conf on Pervas Intelligence and Comp/4th IEEE Int Conf on Big Data Intelligence and Comp/3rd IEEE Cyber Sci and Technol Congress (DASC/PiCom/DataCom/CyberSciTech)
作者: Dorri, Ali Abadi, Mahdi Dadfarnia, Mahila Tarbiat Modares Univ Dept Comp Engn Tehran Iran Yazd Univ Dept Comp Engn Yazd Iran
An online social network (OSN) is a social structure made up of a set of users that are interested to communicate with each other in an online environment in order to share information. Social networking services (SNS... 详细信息
来源: 评论
BotHook: A Supervised Machine Learning Approach for botnet detection Using DNS Query Data  2nd
BotHook: A Supervised Machine Learning Approach for Botnet D...
收藏 引用
2nd International Conference on Communications and Cyber-Physical Engineering (ICCCE)
作者: Biradar, Anuradha D. Padmavathi, B. GH Raisoni Coll Engn & Management Dept Comp Engn Pune Maharashtra India
As of late, botnets are the most radical of all digital assaults and turning into the key issue in distributed computing. botnets are the system of various traded off PCs or potentially cell phones. These gadgets are ... 详细信息
来源: 评论
The Role of Machine Learning in botnet detection  11
The Role of Machine Learning in Botnet Detection
收藏 引用
11th International Conference on Internet Technology and Secured Transactions (ICITST)
作者: Miller, Sean Busby-Earle, Curtis Univ West Indies Mona Dept Comp Kingston Jamaica
Over the past ten to fifteen years botnets have gained the attention of researchers worldwide. A great deal of effort has been given to developing systems that would efficiently and effectively detect the presence of ... 详细信息
来源: 评论
Correlation-Based HTTP botnet detection Using Network Communication Histogram Analysis
Correlation-Based HTTP Botnet Detection Using Network Commun...
收藏 引用
IEEE Conference on Applications, Information and Network Security (AINS)
作者: Naseri, Maryam Var Abidin, Wardah Zainal Eslahi, Meisam Univ Technol Malaysia Adv Informat Sch Skudai Malaysia Asia Pacific Univ Technol & Innovat Fac Comp Engn & Technol Kuala Lumpur Malaysia
The latest generation of botnets use HTTP protocol and port 80 as their communication medium to impersonate themselves as normal web users and avoid current security solutions. In addition, the Botmasters who control ... 详细信息
来源: 评论
An efficient flow-based botnet detection using supervised machine learning
An efficient flow-based botnet detection using supervised ma...
收藏 引用
International Conference on Computing, Networking and Communications (ICNC)
作者: Stevanovic, Matija Pedersen, Jens Myrup Aalborg Univ Dept Elect Syst Networking & Secur Sect DK-9220 Aalborg Denmark
botnet detection represents one of the most crucial prerequisites of successful botnet neutralization. This paper explores how accurate and timely detection can be achieved by using supervised machine learning as the ... 详细信息
来源: 评论
Real-Time botnet detection Using Nonnegative Tucker Decomposition  19
Real-Time Botnet Detection Using Nonnegative Tucker Decompos...
收藏 引用
34th ACM/SIGAPP Annual International Symposium on Applied Computing (SAC)
作者: Kanehara, Hideaki Murakami, Yuma Shimamura, Jumpei Takahashi, Takeshi Inoue, Daisuke Murata, Noboru Waseda Univ Shinjuku Ku Tokyo Japan Clwit Inc Tokyo Japan Natl Inst Informat & Commun Technol Tokyo Japan
This study focuses on darknet traffic analysis and applies tensor factorization in order to detect coordinated group activities, such as a botnet. Tensor factorization is a powerful tool for extracting co-occurrence p... 详细信息
来源: 评论
Botyacc: Unified P2P botnet detection Using Behavioural Analysis and Graph Analysis
Botyacc: Unified P2P Botnet Detection Using Behavioural Anal...
收藏 引用
19th European Symposium on Research in Computer Security (ESORICS)
作者: Nagaraja, Shishir Univ Birmingham Sch Comp Sci Birmingham B15 2TT W Midlands England
The detection and isolation of peer-to-peer botnets is an ongoing problem. We propose a novel technique for detecting P2P botnets. detection is based on unifying behavioural analysis with structured graph analysis. Fi... 详细信息
来源: 评论