[1] Asadi, M.; BagherI, Z. “Detection of Denial of Service Attacks by Ensemble Learning Method”; Journal of Advanced Defense Science & Technology 14, no. 1. 2023. 51-68 (In Persian). Dor: 20.1001.1.26762935.1402.14.1.5.5
[2] Wang, B.; He, Y.; Shui, Z.; Xin, Q.; Lei, H. “Predictive Optimization of DDoS Attack Mitigation in Distributed Systems using Machine Learning”; Applied and Computational Engineering. 2024, 64, 95-100. DOI:10.54254/2755 2721/64/20241350
[3] Mittal, M.; Kumar, K.; Behal, S. “Deep Learning Approaches for Detecting DDoS Attacks: A Systematic Review”; Soft computing. 2023, 27(18), 13039-13075. DOI:10.1007/s00500-021-06608-1
[4] Kumari, P.; Jain, A. K. “A Comprehensive Study of DDoS Attacks Over IoT Network and Their Countermeasures”; Computers & Security. 2023, 127, 103096. DOI:10.1016/j.cose.2023.103096
[5] Mittal, M.; Kumar, K.; Behal, S. “Deep Learning Approaches for Detecting DDoS Attacks: A Systematic Review”; Soft computing. 2023, 27(18). DOI:10.1007/s00500-021-06608-1
[6] Sattari, M. T.; Bagheri, R.; Shirini, K.; Allahverdipour, P. “Modeling Daily and Monthly Rainfall in Tabriz using Ensemble Learning Models and Decision Tree Regression”; Scientific Journal of Golestan University, 2024, 5(18). Doi: 10.30488/CCR.2024.433394.1192
[7] Saleh Esfehani, M.; Abo Ali, M. “An IDS for Detection of Active Attacks Against Routing in Mobile Ad Hoc Networks”; Journal of Advanced Defense Science & Technology 1, no. 1. 2010, 15-22 (In Persian). Dor: 20.1001.1.26762935.1389.1.1.2.1
[8] Behal, S.; Kumar, K. “Characterization and Comparison of DDoS Attack Tools and Traffic Generators: A Review”; Int. J. Netw. Secur. 2017, 19(3). DOI: 10.6633/IJNS.201703.19(3).07)
[9] Michelena, Á,; Aveleira‐Mata, J.; Jove, E.; Bayón‐Gutiérrez, M.; Novais, P.; Romero, O. F.; Aláiz‐Moretón, H. “A novel intelligent approach for man‐in‐the‐middle attacks detection over internet of things environments based on message queuing telemetry transport”; Expert Systems. 2024, 41(2), e13263. DOI:10.1111/exsy.13263.
[10] Choorod, P.; George, W.; Anil Fernando. “Classifying tor traffic encrypted payload using machine learning”; IEEE Access. 2024. DOI: 10.1109/ACCESS.2024.3356073
[11] Priya, S. S.; Sivaram, M.; Yuvaraj, D.; Jayanthiladevi, A. “Machine Learning Based DDoS Detection”; In international conference on emerging smart computing and informatics. 2020,234-237. DOI: 10.1109/ESCI48226.2020.9167642
[12] Kazemitabar, J.; Taheri, R.; Kheradmandian, H. “A Novel Technique for Improvement of Intrusion Detection via Combining Random Forrest and Genetic Algorithm”; 2019, 287-296 (In Persian). Dor: 20.1001.1.26762935.1398.10.3.9.5
[13] Das, S.; Mahfouz, A. M.; Venugopal, D.; Shiva, S. “DDoS Intrusion Detection Through Machine Learning Ensemble”; IEEE 19th international conference on software Quality, Reliability and Security Companion. 2019, 471-477. DOI: 10.1109/QRS-C.2019.00090
[14] Asgharian, H.; Ahmad A.; Raahemi, B. “Engineered Feature Set to Detect Flooding Attacks in SIP Based VoIP’; Journal of Advanced Defense Science & Technology 8, no. 1. 2019: 61-69 (In Persian). Dor: 20.1001.1.26762935.1396.8.1.7.5
[15] Pande, S.; Khamparia, A.; Gupta, D.; Thanh, D. N. “DDOS Detection Using Machine Learning Technique”; Recent Studies on Computational Intelligence: Doctoral Symposium on Computational Intelligence, Springer Singapore. 2021, 59-68. DOI:10.1007/978-981-15-8469-5_5
[16] Abdulla, N. N.; Hasoun, R. K. “Review of Detection Denial of Service Attacks Using Machine Learning Through Ensemble Learning”; Iraqi Journal for Computers and Informatics. 2022, 48(1), 13-20. DOI:10.25195/ijci.v48i1.349
[17] Sattari, M. T.; Shirini, K.; Javidan, S.” Evaluating the efficiency of dimensionality reduction methods in improving the accuracy of water quality index modeling using machine learning algorithms”; Water and Soil Management and Modelling. 2024,4(2), 89-104. DOI: 10.22098/mmws.2023.12434.1241