Works about BOTNETS
Results: 535
Automated, interactive, and traceable domain modelling empowered by artificial intelligence.
- Published in:
- Software & Systems Modeling, 2022, v. 21, n. 3, p. 1015, doi. 10.1007/s10270-021-00942-6
- By:
- Publication type:
- Article
Security establishment using deep convolutional network model in cyber-physical systems.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 31, p. 76201, doi. 10.1007/s11042-024-18535-y
- By:
- Publication type:
- Article
DDoS mitigation using blockchain and machine learning techniques.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 21, p. 60265, doi. 10.1007/s11042-023-18028-4
- By:
- Publication type:
- Article
Towards cyber awareness among smart device users: an interactive, educational display of IoT device vendors compromise history.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 17, p. 52795, doi. 10.1007/s11042-023-17520-1
- By:
- Publication type:
- Article
SD-IIDS: intelligent intrusion detection system for software-defined networks.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 4, p. 11077, doi. 10.1007/s11042-023-15725-y
- By:
- Publication type:
- Article
MOAEOSCA: an enhanced multi-objective hybrid artificial ecosystem-based optimization with sine cosine algorithm for feature selection in botnet detection in IoT.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 9, p. 13369, doi. 10.1007/s11042-022-13836-6
- By:
- Publication type:
- Article
GESTCHA: a gesture-based CAPTCHA design for smart devices using angular velocity.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 1, p. 521, doi. 10.1007/s11042-022-13272-6
- By:
- Publication type:
- Article
A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 14, p. 19879, doi. 10.1007/s11042-021-11859-z
- By:
- Publication type:
- Article
Predictive machine learning-based integrated approach for DDoS detection and prevention.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 3, p. 4185, doi. 10.1007/s11042-021-11740-z
- By:
- Publication type:
- Article
Detecting botnet signals using process mining.
- Published in:
- Computational & Mathematical Organization Theory, 2021, v. 27, n. 2, p. 161, doi. 10.1007/s10588-020-09320-x
- By:
- Publication type:
- Article
Tweeting the cosmos: On the bot poetry of The Ephemerides.
- Published in:
- Convergence: The Journal of Research into New Media Technologies, 2020, v. 26, n. 4, p. 990, doi. 10.1177/1354856519837796
- By:
- Publication type:
- Article
Evaluation of social bot detection models.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2022, v. 30, n. 4, p. 1269, doi. 10.55730/1300-0632.3848
- By:
- Publication type:
- Article
Thank You, Thom Barrie: 15 Years with the ISSA Journal.
- Published in:
- 2020
- By:
- Publication type:
- Interview
Managing IoT Platforms with a Focus on Security.
- Published in:
- ISSA Journal, 2020, v. 18, n. 9, p. 10
- By:
- Publication type:
- Article
Taking a Holistic Approach to Security.
- Published in:
- ISSA Journal, 2019, v. 17, n. 12, p. 18
- By:
- Publication type:
- Article
January 2017 Redux - Have We Made Progress?
- Published in:
- ISSA Journal, 2019, v. 17, n. 12, p. 5
- By:
- Publication type:
- Article
The Two Faces of Innovation: From Safe and Dumb to Vulnerable Smart Products and Infrastructure.
- Published in:
- ISSA Journal, 2018, v. 16, n. 4, p. 32
- By:
- Publication type:
- Article
The Two Faces of Innovation: From Safe and Dumb to Vulnerable and Smart Products and Infrastructure.
- Published in:
- ISSA Journal, 2018, v. 16, n. 2, p. 14
- By:
- Publication type:
- Article
Growing Popularity and Challenges of the IoT.
- Published in:
- ISSA Journal, 2017, v. 15, n. 3, p. 28
- By:
- Publication type:
- Article
When Baby Monitors Become Weapons: Manufacturer Liability for Distributed Denial of Service Attacks by an Internet of Things Botnet Army.
- Published in:
- ISSA Journal, 2017, v. 15, n. 3, p. 14
- By:
- Publication type:
- Article
Stopping the New Wave of DDoS Attacks.
- Published in:
- ISSA Journal, 2017, v. 15, n. 3, p. 8
- By:
- Publication type:
- Article
IoT, Meet the Regulators / Regulators, Meet the rIoT.
- Published in:
- ISSA Journal, 2017, v. 15, n. 3, p. 5
- By:
- Publication type:
- Article
On Distributed Denial of Service Current Defense Schemes.
- Published in:
- Technologies (2227-7080), 2019, v. 7, n. 1, p. 19, doi. 10.3390/technologies7010019
- By:
- Publication type:
- Article
Efficient Large-Scale IoT Botnet Detection through GraphSAINT-Based Subgraph Sampling and Graph Isomorphism Network.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 9, p. 1315, doi. 10.3390/math12091315
- By:
- Publication type:
- Article
KDTM: Multi-Stage Knowledge Distillation Transfer Model for Long-Tailed DGA Detection.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 5, p. 626, doi. 10.3390/math12050626
- By:
- Publication type:
- Article
A Meta-Classification Model for Optimized ZBot Malware Prediction Using Learning Algorithms.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 13, p. 2840, doi. 10.3390/math11132840
- By:
- Publication type:
- Article
Acquaintance Management Algorithm Based on the Multi-Class Risk-Cost Analysis for Collaborative Intrusion Detection Network.
- Published in:
- Journal of Engineering & Technological Sciences, 2021, v. 53, n. 6, p. 1190, doi. 10.5614/j.eng.technol.sci.2021.53.6.10
- By:
- Publication type:
- Article
Web Application Firewall for Detecting and Mitigation of Based DDoS Attacks Using Machine Learning and Blockchain.
- Published in:
- TEM Journal, 2024, v. 13, n. 4, p. 2802, doi. 10.18421/TEM134-17
- By:
- Publication type:
- Article
Detection and Prevention Algorithm of DDoS Attack Over the IOT Networks.
- Published in:
- TEM Journal, 2020, v. 9, n. 3, p. 899, doi. 10.18421/TEM93-09
- By:
- Publication type:
- Article
YOLO-STOD: an industrial conveyor belt tear detection model based on Yolov5 algorithm.
- Published in:
- Scientific Reports, 2025, v. 15, n. 1, p. 1, doi. 10.1038/s41598-024-83619-6
- By:
- Publication type:
- Article
Hybridization of synergistic swarm and differential evolution with graph convolutional network for distributed denial of service detection and mitigation in IoT environment.
- Published in:
- Scientific Reports, 2024, v. 14, n. 1, p. 1, doi. 10.1038/s41598-024-81116-4
- By:
- Publication type:
- Article
Enhanced botnet detection in IoT networks using zebra optimization and dual-channel GAN classification.
- Published in:
- Scientific Reports, 2024, v. 14, n. 1, p. 1, doi. 10.1038/s41598-024-67865-2
- By:
- Publication type:
- Article
A novel mathematical model on Peer-to-Peer botnet.
- Published in:
- Journal of Measurement Science & Instrumentation, 2014, v. 5, n. 4, p. 62, doi. 10.3969/j.issn.1674-8042.2014.04.012
- By:
- Publication type:
- Article
TRAFFIC DETECTION OF TRANSMISSION OF BOTNET THREAT USING BP NEURAL NETWORK.
- Published in:
- Neural Network World, 2018, n. 6, p. 511, doi. 10.14311/NNW.2018.28.028
- By:
- Publication type:
- Article
Implementation of White-Hat Worms Using Mirai Source Code and Its Optimization through Parameter Tuning.
- Published in:
- Future Internet, 2024, v. 16, n. 9, p. 336, doi. 10.3390/fi16090336
- By:
- Publication type:
- Article
A Novel Hybrid Unsupervised Learning Approach for Enhanced Cybersecurity in the IoT.
- Published in:
- Future Internet, 2024, v. 16, n. 7, p. 253, doi. 10.3390/fi16070253
- By:
- Publication type:
- Article
IMTIBOT: An Intelligent Mitigation Technique for IoT Botnets.
- Published in:
- Future Internet, 2024, v. 16, n. 6, p. 212, doi. 10.3390/fi16060212
- By:
- Publication type:
- Article
An Improved Deep Learning Model for DDoS Detection Based on Hybrid Stacked Autoencoder and Checkpoint Network.
- Published in:
- Future Internet, 2023, v. 15, n. 8, p. 278, doi. 10.3390/fi15080278
- By:
- Publication type:
- Article
Enhancing IoT Device Security through Network Attack Data Analysis Using Machine Learning Algorithms.
- Published in:
- Future Internet, 2023, v. 15, n. 6, p. 210, doi. 10.3390/fi15060210
- By:
- Publication type:
- Article
Deep Learning-Based Symptomizing Cyber Threats Using Adaptive 5G Shared Slice Security Approaches.
- Published in:
- Future Internet, 2023, v. 15, n. 6, p. 193, doi. 10.3390/fi15060193
- By:
- Publication type:
- Article
N-Trans: Parallel Detection Algorithm for DGA Domain Names.
- Published in:
- Future Internet, 2022, v. 14, n. 7, p. 209, doi. 10.3390/fi14070209
- By:
- Publication type:
- Article
An Automated Behaviour-Based Clustering of IoT Botnets.
- Published in:
- Future Internet, 2022, v. 14, n. 1, p. 6, doi. 10.3390/fi14010006
- By:
- Publication type:
- Article
A Survey on Botnets: Incentives, Evolution, Detection and Current Trends.
- Published in:
- Future Internet, 2021, v. 13, n. 8, p. 198, doi. 10.3390/fi13080198
- By:
- Publication type:
- Article
Collaborative Blockchain-Based Detection of Distributed Denial of Service Attacks Based on Internet of Things Botnets.
- Published in:
- Future Internet, 2019, v. 11, n. 11, p. 226, doi. 10.3390/fi11110226
- By:
- Publication type:
- Article
Botnet Detection Based On Machine Learning Techniques Using DNS Query Data.
- Published in:
- Future Internet, 2018, v. 10, n. 5, p. 43, doi. 10.3390/fi10050043
- By:
- Publication type:
- Article
Botnet Detection Technology Based on DNS.
- Published in:
- Future Internet, 2017, v. 9, n. 4, p. 55, doi. 10.3390/fi9040055
- By:
- Publication type:
- Article
Practical Attacks on Mobile Cellular Networks and Possible Countermeasures.
- Published in:
- Future Internet, 2013, v. 5, n. 4, p. 474, doi. 10.3390/fi5040474
- By:
- Publication type:
- Article
Detection of Malware by Deep Learning as CNN-LSTM Machine Learning Techniques in Real Time.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 11, p. 2308, doi. 10.3390/sym14112308
- By:
- Publication type:
- Article
PeerAmbush: Multi-Layer Perceptron to Detect Peer-to-Peer Botnet.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 12, p. 2483, doi. 10.3390/sym14122483
- By:
- Publication type:
- Article
An Anomaly-Based IDS Framework Using Centroid-Based Classification.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 1, p. 105, doi. 10.3390/sym14010105
- By:
- Publication type:
- Article