|
B. AsSadhan, and J. M. Moura, "An Efficient Method to Detect Periodic Behavior in Botnet Traffic by Analyzing Control Plane Traffic," Journal of advanced research, vol. 5, no. 4, pp. 435-448, 2014
|
|
C. C. Aggarwal, Y. Zhao, and P. S. Yu, "Outlier Detection in Graph Streams," International Conference on Data Engineering, vol.6791, pp. 399-409, 2011
|
|
L. Akoglu, M. Mcglohon, and C. Faloutsos, "Anomaly Detection in Large Graphs," Cmu-Cs-09-173-Technical Report, 2009.
|
|
H. Choi, and H. Lee, "Identifying Botnets by Capturing Group Activities in DNS Traffic," Elsevier North-Holland, vol. 56, no. 1, pp. 20-33, 2012
|
|
G. Gu, R. Perdisci, R. Perdisci, J. Zhang, and W. Lee, "BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection," Proceedings of the 17th Usenix Security Symposium, pp.139-154, 2008
|
|
S. Gianvecchio, M. Xie, Z. Wu, and H. Wang, "Measurement and Classification of Humans and Bots in Internet Chat," Usenix Security Symposium, pp. 155-170, 2009
|
|
X. Guan, W. Wang, and X. Zhang, "Fast Intrusion Detection Based on A Non-negative Matrix Factorization Model," J. Network and Computer Applications 32 (1), pp. 31–44 2009
|
|
J. A. Hartigan, and M. A. Wong, "A K-means Clustering Algorithm," Journal of the Royal Statistical Society. Series C (Applied Statistics), vol. 28, no. 1, pp. 100-108, 1979
|
|
G. Kirubavathi, and R. Anitha, "Botnets: A Study and Analysis," Computational Intelligence, Cyber Security and Computational Models, pp. 203-214, 2014
|
|
B. Perozzi, and L. Akoglu, "Focused Clustering and Outlier Detection in Large Attributed Graphs," Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1346-1355, 2014
|
|
W. Wang, T. Guyet, R. Quiniou, M. Cordier, F. Masseglia, and X. Zhang, "Autonomic Intrusion Detection: Adaptively Detecting Anomalies over Unlabeled Audit Data Streams in Computer Networks," Knowledge-Based Systems, vol.70 no. 11, pp. 103-117, 2014
|
|
W. Wang, X. Guan, and X. Zhang, "Processing of Massive Audit Data Streams for Real-time Anomaly Intrusion Detection," Computer Communications 31 (1), pp. 58–72, 2008
|
|
W. Wang, J. Liu, G. Pitsilis, and X. Zhang, "Abstracting Massive Data for Lightweight Intrusion Detection in Computer Networks," Information Sciences, vol. 433-434, no. 4, pp. 417-430, 2018
|
|
W. Wang, Y. Li, X. Wang, J. Liu, and X. Zhang, "Detecting Android Malicious Apps and Categorizing Benign Apps with Ensemble of Classifiers," Future Generation Computer Systems, vol.78, pp. 987–994, 2018
|
|
W. Wang, X. Wang, D. Feng, J. Liu, Z. Han, and X. Zhang, "Exploring Permission-induced Risk in Android Applications for Malicious Application Detection," IEEE Transactions on Information Forensics and Security 9 (11), pp. 1869–1882, 2014
|
|
X. Wang, W. Wang, Y. He, J. Liu, Z. Han, and X. Zhang, "Characterizing Android Apps' Behavior for Effective Detection of Malapps at Large Scale," Future Generation Computer Systems, 75: 30-45, 2017
|
|
A. Zimek, E. Schubert, and H. P. Kriegel, "A Survey on Unsupervised Outlier Detection in High-dimensional Numerical Data," Statistical Analysis & Data Mining, vol. 5, no. 5, pp. 363–387, 2012
|
|
D. Zhao, I. Traore, B. Sayed, W. Lu, S. Saad, and A. Ghorbani, "Botnet Detection Based on Traffic Behavior Analysis and Flow Intervals," Computers & Security, vol. 39, no. 4, pp. 2-16, 2013
|
|
Z. Zhu, V. Yegneswaran, and Y. Chen, "Using Failure Information Analysis to Detect Enterprise Zombies," Security and Privacy in Communication Networks, vol. 19, pp. 185-206, 2009
|
|
"Spamhaus Botnet Threat Report 2017," Available at https://www.spamhaus.org/news/article/772/spamhaus-botnet-threat-report-2017, Last accessed on January 31, 2018
|
|
"What is Docker," Available at https://www.docker.com/what-docker, Last accessed on January 31, 2018
|