Results 101 to 110 of about 14,194 (229)
Lightweight Internet of Things Botnet Detection Using One-Class Classification. [PDF]
Malik K +5 more
europepmc +1 more source
An Automated and Comprehensive Framework for IoT Botnet Detection and Analysis (IoT-BDA) [PDF]
Tolijan Trajanovski, Ning Zhang
openalex +1 more source
A privacy-enhanced framework with deep learning for botnet detection
A botnet is a group of hijacked devices that conduct various cyberattacks, which is one of the most dangerous threats on the internet. Organizations or individuals use network traffic to mine botnet communication behavior features.
Guangli Wu, Xingyue Wang
doaj +1 more source
Botnet and Botnet Detection Techniques
Bhavya Alankar, Rimsha Malik
openaire +1 more source
A genomic rule-based KNN model for fast flux botnet detection
Femi Emmanuel Ayo +4 more
openalex +1 more source
Nowadays, the Internet of Things (IoT) has become a rapid development; it can be employed by cyber threats in IoT devices. A correct system to recognize malicious attacks at IoT platforms became of major importance to minimize security threats in IoT ...
Louai A. Maghrabi +6 more
doaj +1 more source
Research on C&C traffic detection of DDoS BotNet in internet of things
C&C communication detection used in IoT DDoS BotNet is an important part to identify DDoS BotNet.By analyzing C&C communication traffic in the BotNet,the characteristics of the smaller C&C communication data packet and the periodicity of DNS ...
Yusheng HE
doaj +2 more sources
Combating Mobile Spam through Botnet Detection using Artificial Immune Systems
Ickin Vural, Hein S. Venter
openalex +1 more source
Machine Learning-Based Approach for Real-Time Detection of Botnet Activities within Wireless Network Infrastructures [PDF]
Okafor Adanna P, Asogwa T.C.
openalex +1 more source
Diving Deep With BotLab-DS1: A Novel Ground Truth-Empowered Botnet Dataset
Cyberspace faces unparalleled threats due to the rapid rise in botnet attacks and their profound repercussions. Utilizing AI-assisted systems emerges as a potent solution for detecting and neutralizing such attacks.
Muhammad Qasim +5 more
doaj +1 more source

