This work is licensed under the Creative Commons Attribution 4.0 International License.
Stergiou, C., & Psannis, K. E. (2017). Recent advances delivered by mobile cloud computing and internet of things for big data applications: a survey. International Journal of Network Management, 27(3), 1-12.Search in Google Scholar
Choi, M., Glassman, M., & Cristol, D. (2017). What it means to be a citizen in the internet age: development of a reliable and valid digital citizenship scale. Computers & Education, 107(APR.), 100-112.Search in Google Scholar
Divakaran, D. M., Fok, K. W., Nevat, I., & Thing, V. L. L. (2017). Evidence gathering for network security and forensics. Digital Investigation, 20S(MAR.), S56-S65.Search in Google Scholar
Jiang, C. (2022). Network security and ideological security based on wireless communication and big data analysis. Wireless Communications and Mobile Computing, 2022(3), 1-6.Search in Google Scholar
Vajjha, H. V. V., & Sushma, P. (2021). Techniques and limitations in securing the log files to enhance network security and monitoring. Solid State Technology, 64(2), 1-8.Search in Google Scholar
Molok, N. N. A., Ahmad, A., & Chang, S. (2018). A case analysis of securing organisations against information leakage through online social networking. International Journal of Information Management, 43(DEC.), 351-356.Search in Google Scholar
Zhang, R., Li, X., Niu, J., & Wang, Y. (2022). A batch delivery mechanism of network update in software-defined wide area networks. International Journal of Network Management, 32(3), e2186.Search in Google Scholar
Kwon, K. H., & Rao, H. R. (2017). Cyber-rumor sharing under a homeland security threat in the context of government internet surveillance: the case of south-north korea conflict. Government Information Quarterly, 34(2), 307-316.Search in Google Scholar
Khammassi, C., & Krichen, S. (2017). A ga-lr wrapper approach for feature selection in network intrusion detection. Computers & Security, 70(sep.), 255-277.Search in Google Scholar
Liu, Z., Su, N., Qin, Y., Lu, J., & Li, X. (2020). A deep random forest model on spark for network intrusion detection. Mobile Information Systems, 2020(1), 1-16.Search in Google Scholar
Salman, O., Elhajj, I. H., Chehab, A., & Kayssi, A. (2022). A machine learning based framework for IoT device identification and abnormal traffic detection. Transactions on Emerging Telecommunications Technologies, 33(3), e3743.Search in Google Scholar
Pandey, A., Shukla, P. K., & Agrawal, R. (2020). An adaptive flying ad-hoc network (fanet) for disaster response operations to improve quality of service (qos). Modern Physics Letters B, 34(12), 2050010.Search in Google Scholar
Hu, H. Y. (2019). Design and application of real-time network abnormal traffic detection system based on spark streaming. International Journal of Embedded Systems, 11(5).Search in Google Scholar
Huang, H., Deng, H., Chen, J., Han, L., & Wang, W. (2018). Automatic multi-task learning system for abnormal network traffic detection. International Journal of Emerging Technologies in Learning, 13(04).Search in Google Scholar
Ye-Kui, Q., De-Sheng, S., Dong, W., Yu-Chong, L., & Zhao-Feng, L. (2018). Network-wide anomalous flow identification method based on traffic characteristics distribution. Procedia Computer Science, 131, 1014-1022.Search in Google Scholar
Niu, W., Zhuo, Z., Zhang, X., Du, X., Yang, G., & Guizani, M. (2019). A heuristic statistical testing based approach for encrypted network traffic identification. IEEE Transactions on Vehicular Technology, 1-1.Search in Google Scholar
Zhu, Y. Z. Y. (2020). Traffic identification and traffic analysis based on support vector machine. Neural computing & applications, 32(7).Search in Google Scholar
Ji, B. K. D. H. (2021). Evaluating visualization approaches to detect abnormal activities in network traffic data. International Journal of Information Security, 20(3).Search in Google Scholar