لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
[1] M. Abu-Khalaf, EE 5322 Neural Networks Notes, Personal Study. ...
[2] M. Botha, V. R. Solms, K. Perry, E. Loubser, ...
[3] V. Vapnik, “Statistical Learning Theory,” John Wiley & Sons ...
[4] J. Zhang, R. Perdisci, W. Lee, U. Sarfraz, and ...
[5] K. Ilgun, R. A. Kemmerer, and P. A. Porras, “State Transition Analysis: ...
[6] X. Yu, X. Dong, G. Yu, Y. Qin, and ...
[7] O. Y. Al-Jarrah, O. Alhussein, P. D. Yoo, S. ...
[8] W. Lu, M. Tavallaee, G. Rammidi, and A. A. ...
[9] S. Parsa, H. Mortazi, “Botnet Detection with Flow Behavior ...
[10] M. Razi and K. Athappilly, “A Comparative Predictive Analysis ...
[11] M. Alauthaman, N. Aslam, L. Zhang, R. Alasem, and ...
[12] A. A. Obeidat, “Hybrid Approach for Botnet Detection Using ...
[13] W. Xianglin, J. Fan, M. Chen, A. Tarem, and ...
[14] S. Saad, I. Traore, A. A. Ghorbani, B. Sayed, ...
[15] N. Kheir and C. Wolley, “BotSuer: Suing Stealthy P2P ...
[16] J. Kang, Y-Z. Song, and J-Y. Zhang, “Accurate Detection ...
[17] T. Cholez, I. Chrisment, O. Festor, and G. Doyen, ...
[18] Y. Fan and N. Xu, “A P2P Botnet Detection ...
[19] S. C. Guntuku, P. P. Narang, and C. Hota, ...
[20] H. Huy, X. Wei, M. Faloutsos, and T. Eliassi-Rad, ...
[21] L. Xu, X. Xu, and Y. Zhuo, “P2P Botnet ...
[22] P. Narang, V. Khurana, and C. Hota, “Machine-learning approaches ...
[23] Y. Qiao, Y. Yang, J. He, C. Tang, and ...
[24] S. García, A. Zunino, and M. Campo, “Survey on ...
[25] A. A. Obeidat, “Analysis the P2P Botnet Detection Methods,” ...
[26] W. Tarng, L-Z. Den, K-L. Ou, and M. Chen, ...
[27] J. Zhang, R. Perdisci, W. Lee, X. Luo, and ...
[28] B. Rahbarinia, R. Perdisci, A. Lanzi, and K. Li, ...
[29] D. Zhao and I. Traore, “P2P Botnet Detection through ...
[30] D. Zhao, I. Traore, B. Sayed, W. Lu, S. ...
[31] G. Kirubavathi Venkatesh and R. Anitha Nadarajan, “HTTP Botnet ...
[32] K. Wang, C-Y. Huang, S-J. Lin, and Y-D. Lin, ...
[33] C-Y. Huang, “Effective bot host detection based on network ...
[34] H. Dhayal and J. Kumar, “Peer-to-Peer Botnet Detection based ...
[35] R. Chen, W. Niu, X. Zhang, Z. Zhuo, and ...
[36] Z. Yang and B. Wang, “A Feature Extraction Method ...
[37] H. R. Zeidanloo, M. J. Z. Shooshtari, P. V. ...
[38] K-S. Han, K-H. Lim, and E-G. Im, “The Traffic ...
[39] S-K. Noh, J-H. Oh, J-S. Lee, B-N. Noh, and ...
[40] C. Li, W. Jiang, and X. Zou, “Botnet: Survey ...
[41] G. Sinclair, C. Nunnery, and B. B. Kang, “The ...
[42] S. Shin, G. Gu, N. Reddy, and C. P. ...
[43] T. Holz, M. Steiner, F. Dahl, E. Biersack, and ...
[44] H. Binsalleeh, T. Ormerod, A. Boukhtouta, P. Sinha, A. ...
[45] G. Gu, J. Zhang, and W. Lee, “BotSniffer: Detecting ...
[46] G. Gu, R. Perdisci, J. Zhang, and W. Lee, ...
[47] T-F. Yen and M. K. Reiter, “Traffic Aggregation for ...
[48] C. Livadas, R. Walsh, D. Lapsley, and W. T. ...
[49] P. van der Putten and M. van Someren, “A ...
[50] S. Hochreiter and J. Schmidhuber, “Long Short-Term Memory,” Neural ...
[51] J. Woodbridge, H. S. Anderson, A. Ahuja, and D. ...
[52] D. Kingma and J. Ba, “Adam: A Method for ...
[53] N. Srivastava, G. E. Hinton, A. Krizhevsky, I. Sutskever, ...
[54] M. Abadi, et al, “TensorFlow: Large-scale machine learning on ...
[55] F. Chollet, “Keras,” Accessed: 2017-05-28 [Online]. Available: https://github.com/fchollet/keras ...
[56] A. Shiravi, H. Shiravi, M. Tavallaee, and A. A. ...
[57] J-D. Wang and H-C. Liu, “An approach to evaluate ...
نمایش کامل مراجع