找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Cyberspace Safety and Security; 11th International S Jaideep Vaidya,Xiao Zhang,Jin Li Conference proceedings 2019 Springer Nature Switzerla

[復(fù)制鏈接]
樓主: 郊區(qū)
31#
發(fā)表于 2025-3-27 00:43:55 | 只看該作者
Boosting Training for PDF Malware Classifier via Active Learningized as a vehicle for malicious behavior. In this paper, machine learning algorithm will be used to detect malicious PDF document, and evaluated on experimental data. The main work of this paper is to implement a malware detection method, which utilizes static pre-processing and machine learning alg
32#
發(fā)表于 2025-3-27 01:42:47 | 只看該作者
33#
發(fā)表于 2025-3-27 09:02:38 | 只看該作者
DeepWAF: Detecting Web Attacks Based on CNN and LSTM Modelsnformation processing and sharing by web applications, the situation for web attack detection or prevention becomes increasingly severe. We present a prototype implementation called DeepWAF to detect web attacks based on deep learning techniques. We systematically discuss the approach for effective
34#
發(fā)表于 2025-3-27 12:18:09 | 只看該作者
Research on Intrusion Detection Based on Semantic Re-encoding and Multi-space Projection The accuracy of the traditional rule-based intrusion detection system is affected. And the false alarm rate of machine learning-based intrusion detection system is high due to the lack of causal link analysis among sampled data and attack events. Aiming at the problem, this paper proposes an intell
35#
發(fā)表于 2025-3-27 15:58:15 | 只看該作者
Software Defect Prediction Model Based on GA-BP Algorithmted for Back Propagation) neural network, which has the problem of easy to fall into local optimization when constructing software defect prediction model, and finally affects the prediction accuracy. Firstly, the optimization ability of GA (abbreviated for Genetic Algorithms) is introduced to optim
36#
發(fā)表于 2025-3-27 19:28:02 | 只看該作者
Security Solution Based on Raspberry PI and IoTwith the aid of cloud and wireless sensor communication technologies. In this paper, the capabilities and limitations of smart home systems were researched. The project built a smart Internet of Things (IoT) system for the security of the home. This project uses inexpensive and commercially availabl
37#
發(fā)表于 2025-3-27 22:49:26 | 只看該作者
38#
發(fā)表于 2025-3-28 02:29:34 | 只看該作者
Research on K-Means Clustering Algorithm Over Encrypted Datas++ that uses the idea of homomorphic encryption to solve the encrypted data multiplication problems, distance calculation problems and the comparison problems. Then apply these security protocols to the improved clustering algorithm framework. To prevent the leakage of privacy while calculating the
39#
發(fā)表于 2025-3-28 07:02:43 | 只看該作者
40#
發(fā)表于 2025-3-28 13:43:15 | 只看該作者
Studies in Educational Leadershipeamforming information table and location consistency of its neighbors after the beam training process. An attack will be declared if an inconsistency is found by a legitimate node in the network. To validate the effectiveness of the algorithms, a simulator is developed and a series of simulations a
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-9 23:44
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
嘉义县| 富裕县| 搜索| 娄底市| 花莲县| 遵义县| 昭苏县| 威信县| 万年县| 临泽县| 漳州市| 长白| 祁门县| 宝丰县| 高唐县| 和平区| 滨海县| 阜宁县| 克什克腾旗| 通城县| 原阳县| 石家庄市| 陵水| 陇西县| 德令哈市| 湘乡市| 昔阳县| 社会| 得荣县| 广东省| 梅河口市| 拜城县| 霍林郭勒市| 民丰县| 泰来县| 平舆县| 安西县| 盐山县| 莱阳市| 新龙县| 策勒县|