Journal of Engineering and Applied Sciences
Year:
2018
Volume:
13
Issue:
2 SI
Page No.
2872 - 2877
References
Gandhi, R., A. Sharma, W. Mahoney, W. Sousan and Q. Zhu,
et al., 2011. Dimensions of cyber-attacks: Cultural, social, economic and political. IEEE. Technol. Soc. Mag., 30: 28-38.
CrossRef | Direct Link | Ghafir, I., V. Prenosil, J. Svoboda and M. Hammoudeh, 2016. A survey on network security monitoring system. Proceeding of the IEEE International Conference on Future Internet of Things and Cloud Workshops, August 22-24, 2016, IEEE, Vienna, Austria, ISBN:978-1-5090-3947-0, pp: 77-82.
Ko, S., K. Kim, Y. Lee and J. Song, 2014. A classification method of darknet traffic for advanced security monitoring and response. Lect. Notes Comput. Sci., 8836: 357-364.
CrossRef | Direct Link | Lagraa, S. and J. Francois, 2017. Knowledge discovery of port scans from darknet. Proceedings of the 2017 IFIP-IEEE Symposium on Integrated Network and Service Management (IM), May 8-12, 2017, IEEE, Lisbon, Portugal, ISBN:978-1-5090-5658-3, pp: 935-940.
Moosavi, S.R., T.N. Gia, E. Nigussie, A.M. Rahmani and S. Virtanen
et al., 2015. Session resumption-based end-to-end security for healthcare internet-of-things. Proceedings of the IEEE International Conference on Computer and Information Technology: Ubiquitous Computing and Communications, Dependable, Autonomic and Secure Computing, Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), October 26-28, 2015, IEEE, Liverpool, England, ISBN:978-1-5090-0154-5, pp: 581-588.
Settanni, G., Y. Shovgenya, F. Skopik, R. Graf and M. Wurzenberger
et al., 2017. Acquiring cyber threat intelligence through security information correlation. Proceedings of the 3rd IEEE International Conference on Cybernetics (CYBCONF’17), June 21-23, 2017, IEEE, Exeter, UK., ISBN:978-1-5386-2202-5, pp: 1-7.
Svoboda, J., I. Ghafir and V. Prenosil, 2015. Network monitoring approaches: An overview. Intl. J. Adv. Comput. Netw. Secur., 5: 88-93.
Direct Link | Ye, Y., T. Li, D. Adjeroh and S.S. Iyengar, 2017. A survey on malware detection using data mining techniques. ACM. Comput. Surv., Vol. 50, 10.1145/3073559
Zavarsky, P. and D. Lindskog, 2016. Experimental analysis of ransomware on windows and android platforms: Evolution and characterization. Procedia Comput. Sci., 94: 465-472.
Direct Link |