Reference29 articles.
1. Q.A. Al-Haija, L. Tawalbeh, Autoregressive modeling and prediction of annual worldwide cybercrimes for cloud environments, in IEEE 10th International Conference on Information and Communication Systems (ICICS), pp. 47–51, 2019
2. W. Noonan, I. Dubrawsky, Firewall Fundamentals (Pearson Education, 2006)
3. G. Ranganathan, Real time anomaly detection techniques using pyspark frame work. J. Artif. Intell. 2(01), 20–30 (2020)
4. P. Karunakaran, Deep Learning Approach to DGA Classification for Effective Cyber Security. J. Ubiquitous Comput. Commun. Technol. (UCCT) 2(04), 203–213 (2020)
5. Q.A. Al-Haija, S. Zein-Sabatto, An efficient deep-learning-based detection and classification system for cyber-attacks in IoT communication networks. Electronics 9(12), 2152. MDPI (2020). https://doi.org/10.3390/electronics9122152
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献