標(biāo)題: Titlebook: Cyberspace Safety and Security; 11th International S Jaideep Vaidya,Xiao Zhang,Jin Li Conference proceedings 2019 Springer Nature Switzerla [打印本頁(yè)] 作者: 郊區(qū) 時(shí)間: 2025-3-21 17:59
書目名稱Cyberspace Safety and Security影響因子(影響力)
書目名稱Cyberspace Safety and Security影響因子(影響力)學(xué)科排名
書目名稱Cyberspace Safety and Security網(wǎng)絡(luò)公開(kāi)度
書目名稱Cyberspace Safety and Security網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書目名稱Cyberspace Safety and Security被引頻次
書目名稱Cyberspace Safety and Security被引頻次學(xué)科排名
書目名稱Cyberspace Safety and Security年度引用
書目名稱Cyberspace Safety and Security年度引用學(xué)科排名
書目名稱Cyberspace Safety and Security讀者反饋
書目名稱Cyberspace Safety and Security讀者反饋學(xué)科排名
作者: 貪心 時(shí)間: 2025-3-21 21:28 作者: lactic 時(shí)間: 2025-3-22 01:19
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/d/image/241946.jpg作者: minaret 時(shí)間: 2025-3-22 07:40
https://doi.org/10.1007/978-1-4020-5269-9ble IoT devices are exploited to constitute botnet by many attackers, which forms a serious problem for network security. To solve it, we propose a novel detection and mitigation mechanism. In our method, we use Software Defined Networking (SDN), a promising network architecture, for dropping malici作者: Constitution 時(shí)間: 2025-3-22 08:42 作者: frivolous 時(shí)間: 2025-3-22 13:34
Studies in Educational Leadership methods can not accurately represent the characteristics of network flow, and have the characteristics of high false alarm rate and high false alarm rate. This paper presents a multi-view distributed denial of service attack network flow feature extraction method based on convolutional neural netwo作者: frivolous 時(shí)間: 2025-3-22 20:17 作者: Insufficient 時(shí)間: 2025-3-22 22:36
Sándor Berényi,Tibor Gyula Nagy(HRM) based on hierarchical representation learning network and a FlowMerge algorithm based on three network flow merging modes are proposed. Firstly, the network traffic is transformed into triples, and the dimensionality reduction of Tsne algorithm is used to transform it into network IP topology 作者: MOT 時(shí)間: 2025-3-23 01:25 作者: 執(zhí) 時(shí)間: 2025-3-23 07:37
Sándor Berényi,Tibor Gyula Nagy of deploying additional fake systems in the corporate network, the production systems themselves should be instrumented to provide active defense capabilities. The proposed concept of traps can be implemented in any corporate production network, with little upfront work and little maintenance.作者: Cirrhosis 時(shí)間: 2025-3-23 12:04
Sándor Berényi,Tibor Gyula Nagyetection from large-scale log data plays a key role in building secure and trustworthy systems. Anomaly detection model based on machine learning has achieved good results in practical applications. However, logs generated by modern large-scale distributed systems are more complex than ever before i作者: Hypopnea 時(shí)間: 2025-3-23 13:59
https://doi.org/10.1007/978-1-349-04124-4ized as a vehicle for malicious behavior. In this paper, machine learning algorithm will be used to detect malicious PDF document, and evaluated on experimental data. The main work of this paper is to implement a malware detection method, which utilizes static pre-processing and machine learning alg作者: 規(guī)范就好 時(shí)間: 2025-3-23 18:48 作者: macabre 時(shí)間: 2025-3-23 22:56
https://doi.org/10.1007/978-1-349-04124-4nformation processing and sharing by web applications, the situation for web attack detection or prevention becomes increasingly severe. We present a prototype implementation called DeepWAF to detect web attacks based on deep learning techniques. We systematically discuss the approach for effective 作者: 矛盾心理 時(shí)間: 2025-3-24 04:17
Sándor Berényi,Tibor Gyula Nagy The accuracy of the traditional rule-based intrusion detection system is affected. And the false alarm rate of machine learning-based intrusion detection system is high due to the lack of causal link analysis among sampled data and attack events. Aiming at the problem, this paper proposes an intell作者: QUAIL 時(shí)間: 2025-3-24 06:57
Sándor Berényi,Tibor Gyula Nagyted for Back Propagation) neural network, which has the problem of easy to fall into local optimization when constructing software defect prediction model, and finally affects the prediction accuracy. Firstly, the optimization ability of GA (abbreviated for Genetic Algorithms) is introduced to optim作者: definition 時(shí)間: 2025-3-24 10:57 作者: Ointment 時(shí)間: 2025-3-24 15:21 作者: Arboreal 時(shí)間: 2025-3-24 21:19 作者: 集中營(yíng) 時(shí)間: 2025-3-25 03:00 作者: 光明正大 時(shí)間: 2025-3-25 03:20 作者: 拋媚眼 時(shí)間: 2025-3-25 11:30
978-3-030-37351-1Springer Nature Switzerland AG 2019作者: Protein 時(shí)間: 2025-3-25 14:54
IoT-Based DDoS Attack Detection and Mitigation Using the Edge of SDNble IoT devices are exploited to constitute botnet by many attackers, which forms a serious problem for network security. To solve it, we propose a novel detection and mitigation mechanism. In our method, we use Software Defined Networking (SDN), a promising network architecture, for dropping malici作者: 貿(mào)易 時(shí)間: 2025-3-25 19:27 作者: AWRY 時(shí)間: 2025-3-25 21:07 作者: obeisance 時(shí)間: 2025-3-26 01:35
DDoS Attack Detection Method Based on V-Support Vector Machinecult to detect the current detection methods. This paper proposes a DDoS attack detection method based on V-Support Vector Machine (SVM). This method defines a nine-tuple network service association feature to extract the feature of the network flow, then normalizes the feature data and reduces the 作者: 搖晃 時(shí)間: 2025-3-26 05:41
DDOS Multivariate Information Fusion Model Based on Hierarchical Representation Learning(HRM) based on hierarchical representation learning network and a FlowMerge algorithm based on three network flow merging modes are proposed. Firstly, the network traffic is transformed into triples, and the dimensionality reduction of Tsne algorithm is used to transform it into network IP topology 作者: atrophy 時(shí)間: 2025-3-26 09:58 作者: mechanism 時(shí)間: 2025-3-26 15:39 作者: Keshan-disease 時(shí)間: 2025-3-26 16:54 作者: EXALT 時(shí)間: 2025-3-27 00:43
Boosting Training for PDF Malware Classifier via Active Learningized as a vehicle for malicious behavior. In this paper, machine learning algorithm will be used to detect malicious PDF document, and evaluated on experimental data. The main work of this paper is to implement a malware detection method, which utilizes static pre-processing and machine learning alg作者: Ankylo- 時(shí)間: 2025-3-27 01:42 作者: Benzodiazepines 時(shí)間: 2025-3-27 09:02
DeepWAF: Detecting Web Attacks Based on CNN and LSTM Modelsnformation processing and sharing by web applications, the situation for web attack detection or prevention becomes increasingly severe. We present a prototype implementation called DeepWAF to detect web attacks based on deep learning techniques. We systematically discuss the approach for effective 作者: Anterior 時(shí)間: 2025-3-27 12:18
Research on Intrusion Detection Based on Semantic Re-encoding and Multi-space Projection The accuracy of the traditional rule-based intrusion detection system is affected. And the false alarm rate of machine learning-based intrusion detection system is high due to the lack of causal link analysis among sampled data and attack events. Aiming at the problem, this paper proposes an intell作者: 欲望小妹 時(shí)間: 2025-3-27 15:58
Software Defect Prediction Model Based on GA-BP Algorithmted for Back Propagation) neural network, which has the problem of easy to fall into local optimization when constructing software defect prediction model, and finally affects the prediction accuracy. Firstly, the optimization ability of GA (abbreviated for Genetic Algorithms) is introduced to optim作者: cumulative 時(shí)間: 2025-3-27 19:28
Security Solution Based on Raspberry PI and IoTwith the aid of cloud and wireless sensor communication technologies. In this paper, the capabilities and limitations of smart home systems were researched. The project built a smart Internet of Things (IoT) system for the security of the home. This project uses inexpensive and commercially availabl作者: 媒介 時(shí)間: 2025-3-27 22:49 作者: 對(duì)手 時(shí)間: 2025-3-28 02:29
Research on K-Means Clustering Algorithm Over Encrypted Datas++ that uses the idea of homomorphic encryption to solve the encrypted data multiplication problems, distance calculation problems and the comparison problems. Then apply these security protocols to the improved clustering algorithm framework. To prevent the leakage of privacy while calculating the作者: Concrete 時(shí)間: 2025-3-28 07:02 作者: jumble 時(shí)間: 2025-3-28 13:43
Studies in Educational Leadershipeamforming information table and location consistency of its neighbors after the beam training process. An attack will be declared if an inconsistency is found by a legitimate node in the network. To validate the effectiveness of the algorithms, a simulator is developed and a series of simulations a作者: 圓錐體 時(shí)間: 2025-3-28 16:24 作者: 不透明 時(shí)間: 2025-3-28 22:18 作者: 釘牢 時(shí)間: 2025-3-29 02:52 作者: NIL 時(shí)間: 2025-3-29 04:28 作者: Inelasticity 時(shí)間: 2025-3-29 08:15 作者: Jargon 時(shí)間: 2025-3-29 13:59
Research on Intrusion Detection Based on Semantic Re-encoding and Multi-space Projection to make the re-encoded semantic space boundaries clearing, thus, effectively improving the detection accuracy and robustness of the algorithm. The SRMPC algorithm can get?>?99% accuracy of general Web attack detection, and when identifying NSL-KDD data sets with CNN, an average performance improvem作者: palliate 時(shí)間: 2025-3-29 15:44
A Method of Malicious Bot Traffic Detectioninformation is extracted, analyzed and selected as feature, finally we use support vector machine algorithm to train the malicious bot traffic detection model and the detection accuracy appears to be quite high. This is a good reference for applying machine learning to the field of cyber security.作者: disparage 時(shí)間: 2025-3-29 20:39
0302-9743 019, held in Guangzhou, China, in December 2019..The 61 full papers and 40 short papers presented were carefully reviewed and selected from 235 submissions.?The papers cover a broad range of topics in the field of cyberspace safety and security, such as authentication,?access control, availability, 作者: GIST 時(shí)間: 2025-3-30 01:19
Sándor Berényi,Tibor Gyula Nagyinformation is extracted, analyzed and selected as feature, finally we use support vector machine algorithm to train the malicious bot traffic detection model and the detection accuracy appears to be quite high. This is a good reference for applying machine learning to the field of cyber security.作者: 設(shè)施 時(shí)間: 2025-3-30 05:49 作者: ciliary-body 時(shí)間: 2025-3-30 10:24 作者: 賄賂 時(shí)間: 2025-3-30 13:49
https://doi.org/10.1007/978-1-349-04124-4neering. Our findings conclude that the INTERNET permission is a critical permission, prone to exploitation and lacks sufficient user control in the Android OS. We propose methods for the control and protection of data by the Android system.作者: Militia 時(shí)間: 2025-3-30 18:39
https://doi.org/10.1007/978-1-349-04124-4ately 95% and the false alarm rate of approximately 2%. We also carried out case studies to analyze the causes of false negatives and false positives, which can be used for further improvements. Our work further illustrates that machine learning has a promising application prospect in the field of web attack detection.作者: Intend 時(shí)間: 2025-3-31 00:32
https://doi.org/10.1057/9780230508705ayer. The proposed protocol not only reduces the encryption and decryption operations of the data packets in the transmission process, but also improves the forwarding efficiency of the message, and further realizes the anonymous authentication and integrity of the message forwarding.作者: 持續(xù) 時(shí)間: 2025-3-31 02:36 作者: 澄清 時(shí)間: 2025-3-31 08:28 作者: Flu表流動(dòng) 時(shí)間: 2025-3-31 09:42 作者: Atheroma 時(shí)間: 2025-3-31 16:11 作者: 駕駛 時(shí)間: 2025-3-31 17:55
Design of Anonymous Communication Protocol Based on Group Signatureayer. The proposed protocol not only reduces the encryption and decryption operations of the data packets in the transmission process, but also improves the forwarding efficiency of the message, and further realizes the anonymous authentication and integrity of the message forwarding.