[1] Debicha, I., Cochez, B., Kenaza, T., Debatty, T., Dricot, J-M., & Mees, W. (2023). Adv-Bot: Realistic adversarial botnet attacks against network intrusion detection systems.
Computers & Security,
129(4), 103176.
https://doi.org/10.1016/j.cose.2023.103176
[2] He, K., Kim, D. D., & Asghar, M. R. (2023). Adversarial Machine Learning for Network Intrusion Detection Systems: A Comprehensive Survey.
Institute of Electrical and Electronics Engineers Communications Surveys & Tutorials,
25(1), 538-566.
https:/ /doi.org/10.1109/COMST.2022.3233793
[3] Raza, A., Siddiqui, H. U. R., Munir, K., Almutairi, M., Rustam, F., & Ashraf, I. (2022). Ensemble learning-based feature engineering to analyze maternal health during pregnancy and health risk prediction.
Plos one,
17(11), e0276525.
https://doi.org/10.1371/jour nal. pone.0276525
[5] Ibrahim, W. N. H., Anuar, S., Selamat, A., Krejcar, O., Crespo, R. G., Herrera-Viedma, E., & Fujita, H. (2021). Multilayer Framework for Botnet Detection Using Machine Learning Algorithms.
Institute of Electrical and Electronics Engineers Access,
9, 48753-48768.
https://doi.org/10.1109/ACCESS.2021.3060778
[6] Dollah, R. F. M., Faizal, M. A., Arif, F., Mas’ud, M. Z., & Xin, L. K. (2018). Machine Learning for HTTP Botnet Detection Using Classifier Algorithms.
Journal of Telecommunication, Electronic and Computer Engineering,
10(1-7), 27-30.
https://j tec.utem.edu.my/jtec/article/view/3591
[7] Lee, S., Abdullah, A., Jhanjhi, N., & Kok, S. (2021). Classification of botnet attacks in IoT smart factory using honeypot combined with machine learning.
Peer Journal Computer Science,
7(6), e350.
https://doi.org/10.7717/peerj-cs.350
[8] Khan, R. U., Zhang, X., Kumar, R., Sharif, A., Golilarz, N. A., & Alazab, M. (2019). An Adaptive Multi-Layer Botnet Detection Technique Using Machine Learning Classifiers.
Applied Sciences,
9(11), 2375.
https://doi.org/10.3390/app9112375
[9] Alkahtani, H., & Aldhyani, T. H. (2021). Botnet attack detection by using CNN-LSTM model for Internet of Things applications.
Security and Communication Networks,
2021, 1-23.
https://doi.org/10.1155/2021/3806459
[10] Alissa, K., Alyas, T., Zafar, K., Abbas, Q., Tabassum, N., & Sakib, S. (2022). Botnet attack detection in iot using machine learning.
Computational Intelligence and Neuroscience,
2022, 1-14.
https://doi.org/10.1155/2022/4515642
[11] Rustam, F., Raza, A., Ashraf, I., & Jurcut, A. D. (2023, June 13-15).
Deep Ensemble-based Efficient Framework for Network Attack Detection. 2023 21st Mediterranean Communication and Computer Networking Conference, Island of Ponza, Italy.
https ://doi.org/10.1109/MedComNet58619.2023.10168864
[12] Bojarajulu, B., Tanwar, S., & Singh, T. P. (2023). Intelligent IoT-BOTNET attack detection model with optimized hybrid classification model.
Computers & Security,
126(2), 103064.
https://doi.org/10.1016/j.cose.2022.103064
[13] Karthik, M. G., & Krishnan, M. B. M. (2021). Hybrid random forest and synthetic minority over sampling technique for detecting internet of things attacks.
Journal of Ambient Intelligence and Humanized Computing, 1-11.
https://doi.org/10.1007/s12652-021-03082-3
[16] Jahromi, A. H., & Taheri, M. (2017, October 25-27).
A non-parametric mixture of Gaussian naive Bayes classifiers based on local independent features. 2017 Artificial Intelligence and Signal Processing Conference, Shiraz, Iran.
https://doi.org/10.1109/AISP.2017. 8324083
[17] Peppes, N., Daskalakis, E., Alexakis, T., Adamopoulou, E., & Demestichas, K. (2021). Performance of Machine Learning-Based Multi-Model Voting Ensemble Methods for Network Threat Detection in Agriculture 4.0.
Sensors,
21(22), 7475.
https://doi. org/10.3390/s21227475
[18] Bottou, L. (2012). Stochastic Gradient Descent Tricks. In G. Montavon, G. B. Orr, & K-R. Müller (Eds.),
Neural Networks: Tricks of the Trade: Second Edition (2 ed.). Springer Berlin Heidelberg.
https://doi.org/10.1007/978-3-642-35289-8_25
[20] Ahmed, S., Khan, Z. A., Mohsin, S. M., Latif, S., Aslam, S., Mujlid, H., Adil, M., & Najam, Z. (2023). Effective and Efficient DDoS Attack Detection Using Deep Learning Algorithm, Multi-Layer Perceptron.
Future Internet,
15(2), 76.
https://doi.org/10.33 90/fi15020076
[21] Gong, D., & Liu, Y. (2022, May 20-22).
A Mechine Learning Approach for Botnet Detection Using LightGBM. 2022 3rd International Conference on Computer Vision, Image and Deep Learning & International Conference on Computer Engineering and Applications, Changchun, China.
https://doi.org/10.1109/CVIDLICCEA56201.2022.9824033
[22] Waskle, S., Parashar, L., & Singh, U. (2020, July 2-4).
Intrusion Detection System Using PCA with Random Forest Approach. 2020 International Conference on Electronics and Sustainable Communication Systems, Coimbatore, India.
https://doi.org/10.110 9/ICESC48915.2020.9155656
[23] Samunnisa, K., Kumar, G. S. V., & Madhavi, K. (2023). Intrusion detection system in distributed cloud computing: Hybrid clustering and classification methods.
Measurement: Sensors,
25, 100612.
https://doi.org/10.1016/j.measen.2022.100612
[24] Dietterich, T. G. (2000). An Experimental Comparison of Three Methods for Constructing Ensembles of Decision Trees: Bagging, Boosting, and Randomization.
Machine Learning,
40(2), 139-157.
https://doi.org/10.1023/A:1007607513941
[25] Sivamohan, S., Sridhar, S. S., & Krishnaveni, S. (2021, June 25-27).
An Effective Recurrent Neural Network (RNN) based Intrusion Detection via Bi-directional Long Short-Term Memory. 2021 International Conference on Intelligent Technologies, Hubli, India.
https://doi.org/10.1109/CONIT51480.2021.9498552