Open Access
ITM Web Conf.
Volume 59, 2024
II International Workshop “Hybrid Methods of Modeling and Optimization in Complex Systems” (HMMOCS-II 2023)
Article Number 03005
Number of page(s) 10
Section Data Mining, Machine Learning and Patern Recognition
Published online 25 January 2024
  1. M. Fraiwan, F. Al-Quran, B. Al-Duwairi, Defense Analysis Against Store and Forward Distributed Reflective Denial of Service Attacks, in 2018 International Conference on Innovations in Information Technology (IIT), 2018, Al Ain, United Arab Emirates (2018) [Google Scholar]
  2. A.Y. Nur, M.E. Tozal, Defending Cyber-Physical Systems against DoS Attacks, in 2016 IEEE International Conference on Smart Computing (SMARTCOMP), 2016, St. Louis, MO, USA (2016) [Google Scholar]
  3. F. Zahid, G. Funchal, V. Melo, M.M.Y. Kuo, P. Leitao, R. Sinha, DDoS Attacks on Smart Manufacturing Systems: A Cross-Domain Taxonomy and Attack Vectors, in 2022 IEEE 20th International Conference on Industrial Informatics (INDIN), 2022, Perth, Australia (2022) [Google Scholar]
  4. N. Sun, M. Ding, J. Jiang, W. Xu, X. Mo, T. Yonghang, J. Zhang, IEEE Communications Surveys & Tutorials 25(3) (2023) [Google Scholar]
  5. M. Tehaam, S. Ahmad, H. Shahid, M.S. Saboor, A. Aziz, K. Munir, A Review of DDoS Attack Detection and Prevention Mechanisms in Clouds, in 2022 24th International Multitopic Conference (INMIC), 2022, Islamabad, Pakistan (2022) [Google Scholar]
  6. A. Iskhakov, R. Meshcheryakov, S. Iskhakov, Problems of Using Compromise Indicators for Proactive Threat Detection in Robotic Systems, in 2021 14th International Conference Management of large-scale system development (MLSD), 2021, Moscow, Russian Federation (2021) [Google Scholar]
  7. A. Iskhakova, R. Meshcheryakov, Automatic search of the malicious messages in the internet of things systems on the example of an intelligent detection of the unnatural agents requests, in 2017 Second Russia and Pacific Conference on Computer Technology and Applications (RPC), 2017, Vladivostok, Russia (2017) [Google Scholar]
  8. M.D.T. Bennet, M.P.S. Bennet, D. Anitha, Securing Smart City Networks - Intelligent Detection Of DDoS Cyber Attacks, in 2022 5th International Conference on Contemporary Computing and Informatics (IC3I), 2022, Uttar Pradesh, India (2022) [Google Scholar]
  9. F. Rebecchi, J. Boite, P.-A. Nardin, M. Bouet, V. Conan, Traffic monitoring and DDoS detection using stateful SDN, in 2017 IEEE Conference on Network Softwarization (NetSoft), 2017, Bologna, Italy (2017) [Google Scholar]
  10. M.E. Sahin, S. Özdemir, Detection of Malicious Requests on Web Logs Using Data Mining Techniques, in 2019 4th International Conference on Computer Science and Engineering (UBMK), 2019, Samsun, Turkey (2019) [Google Scholar]
  11. I. Ghafir, V. Prenosil, DNS traffic analysis for malicious domains detection, in 2015 2nd International Conference on Signal Processing and Integrated Networks (SPIN), 2015, Noida, India (2015) [Google Scholar]
  12. M.R. Rahman, R. Mahdavi-Hezaveh, L. Williams, A Literature Review on Mining Cyberthreat Intelligence from Unstructured Texts, in 2020 International Conference on Data Mining Workshops (ICDMW), 2020, Sorrento, Italy (2020) [Google Scholar]
  13. C. Li, L. Dai, Z. Xu, Y. Ding, Y. Han, A Message-Based Malicious Detection Scheme of Public DNS Services, in 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys), 2021, Haikou, Hainan, China (2021) [Google Scholar]
  14. R. Stoleriu, A. Puncioiu, I. Bica, Cyber Attacks Detection Using Open Source ELK Stack, in 2021 13th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), 2021, Pitesti, Romania (2021) [Google Scholar]
  15. C. Ma, A. Wu, W. Ma, K. Chen, Y. Liu, X. Liang, Malicious URL Recognition Based on Multi-feature Fusion and Machine Learning, in 2022 41st Chinese Control Conference (CCC), 2022, Hefei, China (2022) [Google Scholar]
  16. C.S. Tejaswi, Y. Chaitanya, A. Jesudoss, P. Shyry, Malicious Attacks Detection Using Machine Learning, in 2022 4th International Conference on Inventive Research in Computing Applications (ICIRCA), 2022, Coimbatore, India (2022) [Google Scholar]
  17. J. Wu, Z. Yang, L. Guo, Y. Li, W. Liu, “Convolutional Neural Network with Character Embeddings for Malicious Web Request Detection,” 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), Xiamen, China, 2019, pp. 622-627. [Google Scholar]
  18. A. Raza, S. Memon, M. A. Nizamani, M. Hussain Shah, Machine Learning-Based Security Solutions for Critical Cyber-Physical Systems, in 2022 10th International Symposium on Digital Forensics and Security (ISDFS), 2022, Istanbul, Turkey (2022) [Google Scholar]
  19. R. Prabhla, S. Sankaran, An Experimental Platform for Security of Cyber Physical Systems, in 2019 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS), 2019, Rourkela, India (2019) [Google Scholar]
  20. N. Gulia, K. Solanki, S. Dalal, Comparative Analysis to Identify the Effective Machine Learning Method for Prediction of DDOS Attack, in 2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), 2022, Noida, India (2022) [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.