TY - STD TI - Welivesecurity. Botnet malware: what it is and how to fight it; 2014. http://www.welivesecurity.com/2014/10/22/botnet-malware-fight/. Accessed 21 Dec 15. UR - http://www.welivesecurity.com/2014/10/22/botnet-malware-fight/ ID - ref1 ER - TY - STD TI - Barford P, Yegneswaran V. An inside look at botnets. Special workshop on malware detection: advances in information security; 2006. ID - ref2 ER - TY - STD TI - F-scure. Articles: botnets; 2016. https://www.f-secure.com/en/web/labs_global/botnets. Accessed 21 Feb 16. UR - https://www.f-secure.com/en/web/labs_global/botnets ID - ref3 ER - TY - STD TI - Zeidanloo HR, Shooshtari MJZ, Amoli PV, Safari M, Zamani M. A taxonomy of botnet detection techniques. In: 2010 3rd IEEE international conference on computer science and information technology (ICCSIT), vol 2. New York: IEEE;. 2010. p. 158–62. ID - ref4 ER - TY - STD TI - Ianelli N, Hackworth A. Botnets as a vehicle for online crime; 2005. https://resources.sei.cmu.edu/asset_files/WhitePaper/2005_019_001_51249.pdf. Accessed 24 Apr 2016. UR - https://resources.sei.cmu.edu/asset_files/WhitePaper/2005_019_001_51249.pdf ID - ref5 ER - TY - STD TI - Bacher P, Holz T, Kotter M, Wicherski G. Know your enemy: tracking botnets; 2008. https://www.honeynet.org/papers/bots/. Accessed 24 Apr 2016. UR - https://www.honeynet.org/papers/bots/ ID - ref6 ER - TY - STD TI - Kaspersky. What is botnet attack? 2016. https://usa.kaspersky.com/internet-security-center/threats/botnet-attacks#.V1du3TUrIdV. Accessed 21 Feb 16. UR - https://usa.kaspersky.com/internet-security-center/threats/botnet-attacks%23.V1du3TUrIdV ID - ref7 ER - TY - JOUR AU - Sonawane, S. R. PY - 2016 DA - 2016// TI - A review on botnet and botnet detection methods JO - Int J Comput Sci Innov VL - 1 ID - Sonawane2016 ER - TY - JOUR AU - Fadlullah, Z. M. AU - Taleb, T. AU - Vasilakos, A. V. AU - Guizani, M. AU - Kato, N. PY - 2010 DA - 2010// TI - DTRAB: combating against attacks on encrypted protocols through traffic-feature analysis JO - IEEE/ACM Trans Netw (TON) VL - 18 UR - https://doi.org/10.1109/TNET.2009.2039492 DO - 10.1109/TNET.2009.2039492 ID - Fadlullah2010 ER - TY - JOUR AU - Zhang, J. AU - Chen, C. AU - Xiang, Y. AU - Zhou, W. AU - Xiang, Y. PY - 2013 DA - 2013// TI - Internet traffic classification by aggregating correlated naive bayes predictions JO - IEEE Trans Inf Forens Secur VL - 8 UR - https://doi.org/10.1109/TIFS.2012.2223675 DO - 10.1109/TIFS.2012.2223675 ID - Zhang2013 ER - TY - JOUR AU - Zhang, J. AU - Xiang, Y. AU - Wang, Y. AU - Zhou, W. AU - Xiang, Y. AU - Guan, Y. PY - 2013 DA - 2013// TI - Network traffic classification using correlation information JO - IEEE Trans Parallel Distrib Syst VL - 24 UR - https://doi.org/10.1109/TPDS.2012.98 DO - 10.1109/TPDS.2012.98 ID - Zhang2013 ER - TY - JOUR AU - Zhang, J. AU - Chen, C. AU - Xiang, Y. AU - Zhou, W. AU - Vasilakos, A. V. PY - 2013 DA - 2013// TI - An effective network traffic classification method with unknown flow detection JO - IEEE Trans Netw Serv Manag VL - 10 UR - https://doi.org/10.1109/TNSM.2013.022713.120250 DO - 10.1109/TNSM.2013.022713.120250 ID - Zhang2013 ER - TY - STD TI - Yan Z, Zhang P, Vasilakos AV. A security and trust framework for virtualized networks and software-defined networking. Security and communication networks; 2015. https://www.researchgate.net/profile/Zheng_Yan4/publication/274322323_A_Security_and_Trust_Framework_for_Virtualized_Networks_and_Software-Defined_Networking/links/551ec3a40cf29dcabb08303a.pdf. Accessed 9 Dec 2016. UR - https://www.researchgate.net/profile/Zheng_Yan4/publication/274322323_A_Security_and_Trust_Framework_for_Virtualized_Networks_and_Software-Defined_Networking/links/551ec3a40cf29dcabb08303a.pdf ID - ref13 ER - TY - JOUR AU - Shu, Z. AU - Wan, J. AU - Li, D. AU - Lin, J. AU - Vasilakos, A. V. AU - Imran, M. PY - 2016 DA - 2016// TI - Security in software-defined networking: threats and countermeasures JO - Mob Netw Appl VL - 21 UR - https://doi.org/10.1007/s11036-016-0676-x DO - 10.1007/s11036-016-0676-x ID - Shu2016 ER - TY - STD TI - Zhang J, Perdisci R, Lee W, Sarfraz U, Luo X. Detecting stealthy P2P botnets using statistical traffic fingerprints. In: 2011 IEEE/IFIP 41st international conference on dependable systems & networks (DSN). New York: IEEE; 2011. p. 121–32. ID - ref15 ER - TY - JOUR AU - Choi, H. AU - Lee, H. PY - 2012 DA - 2012// TI - Identifying botnets by capturing group activities in DNS traffic JO - Comput Netw VL - 56 UR - https://doi.org/10.1016/j.comnet.2011.07.018 DO - 10.1016/j.comnet.2011.07.018 ID - Choi2012 ER - TY - STD TI - Livadas C, Walsh R, Lapsley D, Strayer WT. Usilng machine learning technliques to identify botnet traffic. In: 2006 31st IEEE conference on local computer networks, Proceedings. New York: IEEE; 2006. p. 967–74. ID - ref17 ER - TY - STD TI - Strayer WT, Lapsely D, Walsh R, Livadas C. Botnet detection based on network behavior. In: Botnet Detection. Berlin: Springer; 2008. p. 1–24. ID - ref18 ER - TY - JOUR AU - Zhao, D. AU - Traore, I. AU - Sayed, B. AU - Lu, W. AU - Saad, S. AU - Ghorbani, A. AU - Garant, D. PY - 2013 DA - 2013// TI - Botnet detection based on traffic behavior analysis and flow intervals JO - Comput Secur VL - 39 UR - https://doi.org/10.1016/j.cose.2013.04.007 DO - 10.1016/j.cose.2013.04.007 ID - Zhao2013 ER - TY - STD TI - Strayer WT, Walsh R, Livadas C, Lapsley D. Detecting botnets with tight command and control. In: 2006 31st IEEE conference on local computer networks, Proceedings. New York: IEEE; 2006. p. 195–202. ID - ref20 ER - TY - STD TI - Zeidanloo HR, Manaf AB, Vahdani P, Tabatabaei F, Zamani M. Botnet detection based on traffic monitoring. In: 2010 international conference on networking and information technology (ICNIT). New York: IEEE; 2010. p. 97–101. ID - ref21 ER - TY - STD TI - Argus (audit record generation and utilization system); 2016. http://www.qosient.com/argus. Accessed 21 Feb 2016. UR - http://www.qosient.com/argus ID - ref22 ER - TY - STD TI - Karasaridis A, Rexroad B, Hoeflin DA. Wide-scale botnet detection and characterization. HotBots. 2007;7:7. ID - ref23 ER - TY - STD TI - Gu G, Perdisci R, Zhang J, Lee W. BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection. In: USENIX security symposium, vol. 5, no.2. Berkeley, CA, USA: USENIX Association; 2008. p. 139–54. ID - ref24 ER - TY - STD TI - Arshad S, Abbaspour M, Kharrazi M, Sanatkar H. An anomaly-based botnet detection approach for identifying stealthy botnets. In: 2011 IEEE international conference on computer applications and industrial electronics (ICCAIE). New York: IEEE; 2011. p. 564–9. ID - ref25 ER - TY - JOUR AU - Amini, P. AU - Azmi, R. AU - Araghizadeh, M. PY - 2014 DA - 2014// TI - Botnet detection using NetFlow and clustering JO - Adv Comput Sci Int J VL - 3 ID - Amini2014 ER - TY - JOUR AU - Lu, W. AU - Rammidi, G. AU - Ghorbani, A. A. PY - 2011 DA - 2011// TI - Clustering botnet communication traffic based on n-gram feature selection JO - Comput Commun VL - 34 UR - https://doi.org/10.1016/j.comcom.2010.04.007 DO - 10.1016/j.comcom.2010.04.007 ID - Lu2011 ER - TY - STD TI - Goebel J, Holz T. Rishi: identify bot contaminated hosts by IRC nickname evaluation. In: USENIX workshop on hot topics in understanding botnets (HotBots’07); 2007. ID - ref28 ER - TY - JOUR AU - Binkley, J. R. AU - Singh, S. PY - 2006 DA - 2006// TI - An algorithm for anomaly-based botnet detection JO - SRUTI VL - 6 ID - Binkley2006 ER - TY - STD TI - Gu G, Zhang J, Lee W. BotSniffer: detecting botnet command and control channels in network traffic; 2008. ID - ref30 ER - TY - STD TI - Al-Duwairi B, Al-Ebbini L. BotDigger: a fuzzy inference system for botnet detection. In: 2010 fifth international conference on internet monitoring and protection (ICIMP). New York: IEEE; 2010. p. 16–21. ID - ref31 ER - TY - STD TI - AsSadhan B, Moura JM, Lapsley D, Jones C, Strayer WT. Detecting botnets using command and control traffic. In: 2009 NCA 2009. eighth IEEE international symposium on network computing and applications. New York: IEEE; 2009. p. 156–62. ID - ref32 ER - TY - JOUR AU - Venkatesh, B. AU - Choudhury, S. H. AU - Nagaraja, S. AU - Balakrishnan, N. PY - 2015 DA - 2015// TI - BotSpot: fast graph based identification of structured P2P bots JO - J Comput Virol Hacking Tech VL - 11 UR - https://doi.org/10.1007/s11416-015-0250-2 DO - 10.1007/s11416-015-0250-2 ID - Venkatesh2015 ER - TY - STD TI - Ding Q, Katenka N, Barford P, Kolaczyk E, Crovella M. Intrusion as (anti) social communication: characterization and detection. In: Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining. New York: ACM; 2012. p. 886–94. ID - ref34 ER - TY - STD TI - Henderson K, Gallagher B, Eliassi-Rad T, Tong H, Basu S, Akoglu L, Li L. Rolx: structural role extraction and mining in large graphs. In: Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining. New York: ACM; 2012. p. 1231–9. ID - ref35 ER - TY - STD TI - Henderson K, Gallagher B, Li L, Akoglu L, Eliassi-Rad T, Tong H, Faloutsos C. It’s who you know: graph mining using recursive structural features. In: Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining. New York: ACM; 2011. p. 663–71. ID - ref36 ER - TY - STD TI - Kang U, McGlohon M, Akoglu L, Faloutsos C. Patterns on the connected components of terabyte-scale graphs. In: 2010 IEEE 10th international conference ondata mining (ICDM). New York: IEEE; 2010. p. 875–80. ID - ref37 ER - TY - JOUR AU - Aggarwal, C. C. PY - 2013 DA - 2013// TI - Outlier ensembles: position paper JO - ACM SIGKDD Explor Newsl VL - 14 UR - https://doi.org/10.1145/2481244.2481252 DO - 10.1145/2481244.2481252 ID - Aggarwal2013 ER - TY - JOUR AU - Zimek, A. AU - Campello, R. J. AU - Sander, J. PY - 2014 DA - 2014// TI - Ensembles for unsupervised outlier detection: challenges and research questions a position paper JO - ACM SIGKDD Explor Newsl VL - 15 UR - https://doi.org/10.1145/2594473.2594476 DO - 10.1145/2594473.2594476 ID - Zimek2014 ER - TY - STD TI - Chen HH, Giles CL. ASCOS: an asymmetric network structure context similarity measure. In: 2013 IEEE/ACM international conference on advances in social networks analysis and mining (ASONAM). New York: IEEE; 2013. p. 442–49. ID - ref40 ER - TY - STD TI - Sun H, Huang J, Han J, Deng H, Zhao P, Feng B. Gskeletonclu: density-based network clustering via structure-connected tree division or agglomeration. In: 2010 IEEE 10th international conference on data mining (ICDM). New York: IEEE; 2010. p. 481–90. ID - ref41 ER - TY - STD TI - Tong H, Lin CY. Non-negative residual matrix factorization with application to graph anomaly detection. In: Proceedings of the 2011 SIAM international conference on data mining. Society for industrial and applied mathematics. 2011. p. 143–53. ID - ref42 ER - TY - JOUR AU - Ambai, M. AU - Utama, N. P. AU - Yoshida, Y. PY - 2011 DA - 2011// TI - Dimensionality reduction for histogram features based on supervised non-negative matrix factorization JO - IEICE Trans Inf Syst VL - 94 UR - https://doi.org/10.1587/transinf.E94.D.1870 DO - 10.1587/transinf.E94.D.1870 ID - Ambai2011 ER - TY - STD TI - Nikulin V, Huang TH. Unsupervised dimensionality reduction via gradient-based matrix factorization with two adaptive learning rates. In: ICML unsupervised and transfer learning. 2012. p. 181–94. ID - ref44 ER - TY - STD TI - Davis M, Liu W, Miller P, Redpath G. Detecting anomalies in graphs with numeric labels. In: Proceedings of the 20th ACM international conference on Information and knowledge management. New York: ACM; 2011. p. 1197–202. ID - ref45 ER - TY - STD TI - Eberle W, Holder L. Discovering structural anomalies in graph-based data. In:seventh IEEE international conference on data mining workshops, 2007. ICDM workshops 2007. New York: IEEE; 2007. p. 393–8. ID - ref46 ER - TY - JOUR AU - Kontkanen, P. AU - Myllymäki, P. PY - 2007 DA - 2007// JO - MDL Histogram Density Estim Rn VL - 1000 ID - Kontkanen2007 ER - TY - STD TI - Gao J, Liang F, Fan W, Wang C, Sun Y, Han J. On community outliers and their efficient detection in information networks. In: Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining. New York: ACM; 2010. p. 813–22. ID - ref48 ER - TY - STD TI - Muller E, Sánchez PI, Mulle Y, Bohm K. Ranking outlier nodes in subspaces of attributed graphs. In: 2013 IEEE 29th international conference ondata engineering workshops (ICDEW). New York: IEEE; 2013. p. 216–22. ID - ref49 ER - TY - STD TI - Perozzi B, Akoglu L, Iglesias Sánchez P, Müller E. Focused clustering and outlier detection in large attributed graphs. In: Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining. New York: ACM; 2014. p. 1346–55. ID - ref50 ER - TY - STD TI - Kang U, Papadimitriou S, Sun J, Tong H. Centralities in large networks: algorithms and observations. In: Proceedings of the 11th SIAM international conference on data mining (SDM), Mesa,AZ, 2011b. p 119–30. ID - ref51 ER - TY - JOUR AU - Gao, X. AU - Xiao, B. AU - Tao, D. AU - Li, X. PY - 2010 DA - 2010// TI - A survey of graph edit distance JO - Pattern Anal Appl VL - 13 UR - https://doi.org/10.1007/s10044-008-0141-y DO - 10.1007/s10044-008-0141-y ID - Gao2010 ER - TY - BOOK AU - Bunke, H. AU - Dickinson, P. J. AU - Kraetzl, M. AU - Wallis, W. D. PY - 2007 DA - 2007// TI - A graph-theoretic approach to enterprise network dynamics, Vol. 24 PB - Business Media CY - Berlin ID - Bunke2007 ER - TY - STD TI - Akoglu L, Faloutsos C. Event detection in time series of mobile communication graphs. In: army science conference. 2010. p. 77–9. ID - ref54 ER - TY - STD TI - Rossi RA, Gallagher B, Neville J, Henderson K. Modeling dynamic behavior in large evolving graphs. In: Proceedings of the sixth ACM international conference on web search and data mining. New York: ACM; 2013. p. 667–76. ID - ref55 ER - TY - STD TI - Ishibashi K, Kondoh T, Harada S, Mori T, Kawahara R, Asano S. Detecting anomalous traffic using communication graphs. In: telecommunications: the infrastructure for the 21st century (WTC), 2010. VDE; 2010. p. 1–6. ID - ref56 ER - TY - STD TI - Papalexakis EE, Faloutsos C, Sidiropoulos ND. Parcube: sparse parallelizable tensor decompositions. In: joint european conference on machine learning and knowledge discovery in databases. Berlin: Springer; 2012. p. 521–36. ID - ref57 ER - TY - STD TI - Leskovec J, Lang KJ, Mahoney M. Empirical comparison of algorithms for network community detection. In: Proceedings of the 19th international conference on World wide web. New York: ACM; 2010. p. 631–40. ID - ref58 ER - TY - STD TI - Peel L, Clauset A. Detecting change points in the large-scale structure of evolving networks. arXiv:1403.0989. UR - http://arxiv.org/abs/1403.0989 ID - ref59 ER - TY - STD TI - Li L, Mathur S, Coskun B. Gangs of the internet: towards automatic discovery of peer-to-peer communities. In: 2013 IEEE conference on communications and network security (CNS). New York: IEEE; 2013. p. 64–72. ID - ref60 ER - TY - STD TI - Malware capture facility project. The CTU-13 dataset: a labeled dataset with botnet, normal and background traffic 2016. http://mcfp.weebly.com/the-ctu-13-dataset-a-labeled-dataset-with-botnet-normal-and-background-traffic.html. Accessed 26 Jan 2016. UR - http://mcfp.weebly.com/the-ctu-13-dataset-a-labeled-dataset-with-botnet-normal-and-background-traffic.html ID - ref61 ER - TY - STD TI - Collins MP, Reiter MK. Hit-list worm detection and bot identification in large networks using protocol graphs. In: international workshop on recent advances in intrusion detection. Berlin: Springer; 2007. p. 276–95. ID - ref62 ER - TY - STD TI - Wang J, Paschalidis IC. Botnet detection using social graph analysis. In: 2014 52nd annual allerton conference on communication, control, and computing (Allerton). New York: IEEE; 2014. p. 393–400. ID - ref63 ER - TY - JOUR AU - Iliofotou, M. AU - Kim, H. C. AU - Faloutsos, M. AU - Mitzenmacher, M. AU - Pappu, P. AU - Varghese, G. PY - 2011 DA - 2011// TI - Graption: a graph-based P2P traffic classification framework for the internet backbone JO - Comput Netw VL - 55 UR - https://doi.org/10.1016/j.comnet.2011.01.020 DO - 10.1016/j.comnet.2011.01.020 ID - Iliofotou2011 ER - TY - STD TI - Zhao Y, Xie Y, Yu F, Ke Q, Yu Y, Chen Y, Gillum E. BotGraph: large scale spamming botnet detection. In: Nsdi ,vol. 9. p. 321–34. ID - ref65 ER - TY - JOUR AU - Jaikumar, P. AU - Kak, A. C. PY - 2015 DA - 2015// TI - A graph theoretic framework for isolating botnets in a network JO - Secur Commun Netw VL - 8 UR - https://doi.org/10.1002/sec.500 DO - 10.1002/sec.500 ID - Jaikumar2015 ER - TY - STD TI - Nagaraja S, Mittal P, Hong CY, Caesar M, Borisov N. BotGrep: finding P2P bots with structured graph analysis. In: USENIX security symposium. 2010. p. 95–110. ID - ref67 ER - TY - STD TI - François J, Wang S, Engel T. BotTrack: tracking botnets using NetFlow and PageRank. In: international conference on research in networking. Berlin: Springer. 2011. p. 1–14. ID - ref68 ER - TY - STD TI - Francois J, Wang S, Bronzi W, State R, Engel T. BotCloud: detecting botnets using mapreduce. In: 2011 IEEE international workshop on information forensics and security (WIFS). New York: IEEE; 2011. p. 1–6. ID - ref69 ER - TY - STD TI - Hang H, Wei X, Faloutsos M, Eliassi-Rad T. Entelecheia: detecting p2p botnets in their waiting stage. In: IFIP networking conference, 2013. New York: IEEE; 2013. p. 1–9. ID - ref70 ER - TY - JOUR AU - Tsai, C. W. AU - Lai, C. F. AU - Chao, H. C. AU - Vasilakos, A. V. PY - 2015 DA - 2015// TI - Big data analytics: a survey JO - J Big Data VL - 2 UR - https://doi.org/10.1186/s40537-015-0030-3 DO - 10.1186/s40537-015-0030-3 ID - Tsai2015 ER - TY - JOUR AU - Fong, S. AU - Wong, R. AU - Vasilakos, A. V. PY - 2016 DA - 2016// TI - Accelerated PSO swarm search feature selection for data stream mining big data JO - IEEE Trans Serv Comput VL - 9 ID - Fong2016 ER - TY - JOUR AU - Garcia, S. AU - Grill, M. AU - Stiborek, J. AU - Zunino, A. PY - 2014 DA - 2014// TI - An empirical comparison of botnet detection methods JO - Comput Secur VL - 45 UR - https://doi.org/10.1016/j.cose.2014.05.011 DO - 10.1016/j.cose.2014.05.011 ID - Garcia2014 ER - TY - JOUR AU - Grill, M. AU - Pevný, T. AU - Rehak, M. PY - 2017 DA - 2017// TI - Reducing false positives of network anomaly detection by local adaptive multivariate smoothing JO - J Comput Syst Sci VL - 83 UR - https://doi.org/10.1016/j.jcss.2016.03.007 DO - 10.1016/j.jcss.2016.03.007 ID - Grill2017 ER - TY - STD TI - Chanthakoummane Y, Saiyod S, Benjamas, N Khamphakdee N. Evaluation Snort-IDS rules for botnets detection; 2016. http://www.it.kmitl.ac.th/~natapon/ncit2015/papers/p87-chanthakoummane.pdf. Accessed 11 Apr 2016. UR - http://www.it.kmitl.ac.th/%7enatapon/ncit2015/papers/p87-chanthakoummane.pdf ID - ref75 ER - TY - STD TI - Małowidzki M, Berezinski P, Mazur M. Network intrusion detection: half a kingdom for a good dataset. In Proceedings of NATO STO SAS-139 Workshop, Portugal; 2015. ID - ref76 ER - TY - STD TI - Graph-tool. https://graph-tool.skewed.de/. UR - https://graph-tool.skewed.de/ ID - ref77 ER - TY - STD TI - Technopedia.data packet. 2016. https://www.techopedia.com/definition/6751/data-packet. Accessed 05 May 2016. UR - https://www.techopedia.com/definition/6751/data-packet ID - ref78 ER - TY - STD TI - Rafiei D. Effectively visualizing large networks through sampling. In: visualization, 2005. VIS 05. IEEE. New York: IEEE; 2005. p. 375–82. ID - ref79 ER - TY - JOUR AU - Brandes, U. PY - 2001 DA - 2001// TI - A faster algorithm for betweenness centrality JO - J Math Sociol VL - 25 UR - https://doi.org/10.1080/0022250X.2001.9990249 DO - 10.1080/0022250X.2001.9990249 ID - Brandes2001 ER - TY - STD TI - Rocchini C. Hue scale representing node betweenness on a graph; 2007. https://commons.wikimedia.org/w/index.php?curid=1988980. Accessed 05 Apr 2015. UR - https://commons.wikimedia.org/w/index.php?curid=1988980 ID - ref81 ER - TY - JOUR AU - Watts, D. J. AU - Strogatz, S. H. PY - 1998 DA - 1998// TI - Collective dynamics of ‘small-world’networks JO - Nature VL - 393 UR - https://doi.org/10.1038/30918 DO - 10.1038/30918 ID - Watts1998 ER - TY - JOUR AU - Langville, A. N. AU - Meyer, C. D. PY - 2005 DA - 2005// TI - A survey of eigenvector methods for web information retrieval JO - SIAM rev VL - 47 UR - https://doi.org/10.1137/S0036144503424786 DO - 10.1137/S0036144503424786 ID - Langville2005 ER - TY - JOUR AU - Kifer, Y. PY - 1996 DA - 1996// TI - Perron-Frobenius theorem, large deviations, and random perturbations in random environments JO - Math Z VL - 222 UR - https://doi.org/10.1007/BF02621888 DO - 10.1007/BF02621888 ID - Kifer1996 ER - TY - CHAP AU - Newman, M. E. J. ED - Durlauf, S. N. ED - Blume, L. E. PY - 2008 DA - 2008// TI - The mathematics of networks BT - The new palgrave dictionary of economics PB - Imprint Palgrave Macmillan CY - Basingstoke ID - Newman2008 ER - TY - STD TI - Bullinaria JA. Self-organizing maps: fundamentals; 2004. http://www.cs.bham.ac.uk/~jxb/NN/l16.pdf. Accessed 13 Jun 2016. UR - http://www.cs.bham.ac.uk/%7ejxb/NN/l16.pdf ID - ref86 ER - TY - STD TI - Guthikonda SM, Kohonen. Self-organizing maps. 2005. http://www.shy.am/wp-content/uploads/2009/01/kohonen-self-organizing-maps-shyam-guthikonda.pdf. Accessed 20 Jan 1016. UR - http://www.shy.am/wp-content/uploads/2009/01/kohonen-self-organizing-maps-shyam-guthikonda.pdf ID - ref87 ER - TY - JOUR AU - Cortes, C. AU - Vapnik, V. PY - 1995 DA - 1995// TI - Support-vector networks JO - Mach Learn VL - 20 ID - Cortes1995 ER - TY - JOUR AU - Malhotra, R. AU - Jain, A. PY - 2012 DA - 2012// TI - Fault prediction using statistical and machine learning methods for improving software quality JO - J Inf Process Syst VL - 8 UR - https://doi.org/10.3745/JIPS.2012.8.2.241 DO - 10.3745/JIPS.2012.8.2.241 ID - Malhotra2012 ER - TY - JOUR AU - Durgesh, K. S. AU - Lekha, B. PY - 2010 DA - 2010// TI - Data classification using support vector machine JO - J Theor Appl Inf Technol VL - 12 ID - Durgesh2010 ER -