A new method for assigning appropriate labels to create a 28 Standard Android Botnet Dataset (28-SABD)
Published 2018 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
A new method for assigning appropriate labels to create a 28 Standard Android Botnet Dataset (28-SABD)
Authors
Keywords
-
Journal
Journal of Ambient Intelligence and Humanized Computing
Volume -, Issue -, Pages -
Publisher
Springer Nature America, Inc
Online
2018-11-27
DOI
10.1007/s12652-018-1140-5
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Towards the autonomous provision of self-protection capabilities in 5G networks
- (2018) Alberto Huertas Celdrán et al. Journal of Ambient Intelligence and Humanized Computing
- Dynamic management of a deep learning-based anomaly detection system for 5G networks
- (2018) Lorenzo Fernández Maimó et al. Journal of Ambient Intelligence and Humanized Computing
- Structural analysis and detection of android botnets using machine learning techniques
- (2017) G. Kirubavathi et al. International Journal of Information Security
- Management platform of threats information in IoT environment
- (2017) Eunhye Ko et al. Journal of Ambient Intelligence and Humanized Computing
- The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems
- (2017) Ashraf Darwish et al. Journal of Ambient Intelligence and Humanized Computing
- Internet of things for remote elderly monitoring: a study from user-centered perspective
- (2016) Iman Azimi et al. Journal of Ambient Intelligence and Humanized Computing
- SMARTbot: A Behavioral Analysis Framework Augmented with Machine Learning to Identify Mobile Botnet Applications
- (2016) Ahmad Karim et al. PLoS One
- From botnets to MobiBots: a novel malicious communication paradigm for mobile botnets
- (2015) Abderrahmen Mtibaa et al. IEEE COMMUNICATIONS MAGAZINE
- Bluetooth Command and Control channel
- (2014) Heloise Pieterse et al. COMPUTERS & SECURITY
- Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection
- (2014) Wei Wang et al. IEEE Transactions on Information Forensics and Security
- A Taxonomy of Botnet Behavior, Detection, and Defense
- (2013) Sheharbano Khattak et al. IEEE Communications Surveys and Tutorials
- Peri-Watchdog: Hunting for hidden botnets in the periphery of online social networks
- (2012) Guanhua Yan Computer Networks
- Clustering botnet communication traffic based on n-gram feature selection
- (2010) Wei Lu et al. COMPUTER COMMUNICATIONS
- Stuxnet, the real start of cyber warfare? [Editor's Note]
- (2010) Thomas M. Chen IEEE NETWORK
- A self-training semi-supervised SVM algorithm and its application in an EEG-based brain computer interface speller system
- (2008) Yuanqing Li et al. PATTERN RECOGNITION LETTERS
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started