Home > Articles

This chapter is from the book

References

1 Sims, Jeff. 2023. BlackMamba: Using AI to Generate Polymorphic Malware. https://www.hyas.com/blog/blackmamba-using-ai-to-generate-polymorphic-malware.

2 Vinayakumar, R., Mamoun Alazab, K. P. Soman, Prabaharan Poornachandran, Ameer Al-Nemrat, and Sitalakshmi Venkatraman. 2019. “Deep Learning Approach for Intelligent Intrusion Detection System.” IEEE Access 7: 41525–50. https://doi.org/10.1109/ACCESS.2019.2895334.

3 Anthi, Eirini, Lowri Williams, Malgorzata Slowinska, George Theodorakopoulos, and Pete Burnap. 2019. “A Supervised Intrusion Detection System for Smart Home IoT Devices.” IEEE Internet of Things Journal 6(5): 9042–53. https://doi.org/10.1109/JIOT.2019.2926365.

4 Sommer, Robin, and Vern Paxson. 2010. “Outside the Closed World: On Using Machine Learning for Network Intrusion Detection.” IEEE Symposium on Security and Privacy, 305–16. https://doi.org/10.1109/SP.2010.25.

5 Cao, Yongyi, Hao Jiang, Yuchuan Deng, Jing Wu, Pan Zhou, and Wei Luo. 2021. “Detecting and Mitigating DDoS Attacks in SDN Using Spatial-Temporal Graph Convolutional Network.” IEEE Transactions on Dependable and Secure Computing 19(6): 3855–72. https://doi.org/10.1109/TDSC.2021.3108782.

6 Dora, V. Raghava Swamy, and V. Naga Lakshmi. 2022. “Optimal Feature Selection with CNN-Feature Learning for DDoS Attack Detection Using Meta-Heuristic-Based LSTM.” International Journal of Intelligent Robotics and Applications 6(2): 323–49. https://doi.org/10.1007/S41315-022-00224-4.

7 Leverett, Eireann, and Aaron Kaplan. 2017. “Towards Estimating the Untapped Potential: A Global Malicious DDoS Mean Capacity Estimate.” Journal of Cyber Policy 2(2): 195–208. https://doi.org/10.1080/23738871.2017.1362020.

8 Siddarth, Divya, Sergey Ivliev, Santiago Siri, and Paula Berman. 2020. “Who Watches the Watchmen? A Review of Subjective Approaches for Sybil-Resistance in Proof of Personhood Protocols.” Frontiers in Blockchain 3: 590171. https://doi.org/10.3389/FBLOC.2020.590171.

9 Douceur, John R. 2002. “The Sybil Attack.” Lecture Notes in Computer Science 2429: 251–60. https://doi.org/10.1007/3-540-45748-8_24.

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.