派博傳思國際中心

標題: Titlebook: Machine Learning for Cyber Security; Third International Xiaofeng Chen,Hongyang Yan,Xiangliang Zhang Conference proceedings 2020 Springer [打印本頁]

作者: introspective    時間: 2025-3-21 19:35
書目名稱Machine Learning for Cyber Security影響因子(影響力)




書目名稱Machine Learning for Cyber Security影響因子(影響力)學(xué)科排名




書目名稱Machine Learning for Cyber Security網(wǎng)絡(luò)公開度




書目名稱Machine Learning for Cyber Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Machine Learning for Cyber Security被引頻次




書目名稱Machine Learning for Cyber Security被引頻次學(xué)科排名




書目名稱Machine Learning for Cyber Security年度引用




書目名稱Machine Learning for Cyber Security年度引用學(xué)科排名




書目名稱Machine Learning for Cyber Security讀者反饋




書目名稱Machine Learning for Cyber Security讀者反饋學(xué)科排名





作者: cutlery    時間: 2025-3-21 20:14
Ming Wan,Jinfang Li,Hao Luo,Kai Wang,Yingjie Wang,Bailing Wangnd supranationaler Arzneibücher.Das Lexikon der Arzneipflanzen und Drogen gibt einen umfassenden überblick über die heute wie auch in früherer Zeit verwendeten Arzneidrogen...Die .3. Auflage. des Lexikons enth?lt ca. 480 neue Artikel inkl. Strukturformeln der Drogeninhaltsstoffe und wurde um das Geb
作者: bioavailability    時間: 2025-3-22 00:48

作者: 重畫只能放棄    時間: 2025-3-22 06:54
Weijie Han,Jingfeng Xue,Fuquan Zhang,Yingfeng Zhangnd supranationaler Arzneibücher.Das Lexikon der Arzneipflanzen und Drogen gibt einen umfassenden überblick über die heute wie auch in früherer Zeit verwendeten Arzneidrogen...Die .3. Auflage. des Lexikons enth?lt ca. 480 neue Artikel inkl. Strukturformeln der Drogeninhaltsstoffe und wurde um das Geb
作者: 公豬    時間: 2025-3-22 12:05

作者: Prognosis    時間: 2025-3-22 16:26
Fangwei Wang,Shaojie Yang,Changguang Wang,Qingru Lirifflich neu gepriigt, angloamerikanische Termini in die traditio- nelle Nomenklatur iibernommen und bekannte Erkrankungen durch verbesserte Untersuchungsmethoden in zahlreiche Varietiiten unter- teilt. Der gleichzeitige, ja teilweise gleichberechtigte Gebrauch alther- gebrachter und neueingefiihrte
作者: hypnotic    時間: 2025-3-22 18:48

作者: 多山    時間: 2025-3-23 00:13
Yiguang Gong,Yunping Liu,Chuanyang Yin,Zhiyong Fanrifflich neu gepriigt, angloamerikanische Termini in die traditio- nelle Nomenklatur iibernommen und bekannte Erkrankungen durch verbesserte Untersuchungsmethoden in zahlreiche Varietiiten unter- teilt. Der gleichzeitige, ja teilweise gleichberechtigte Gebrauch alther- gebrachter und neueingefiihrte
作者: convert    時間: 2025-3-23 05:21
Yaming Zhang,Yan Liurifflich neu gepriigt, angloamerikanische Termini in die traditio- nelle Nomenklatur iibernommen und bekannte Erkrankungen durch verbesserte Untersuchungsmethoden in zahlreiche Varietiiten unter- teilt. Der gleichzeitige, ja teilweise gleichberechtigte Gebrauch alther- gebrachter und neueingefiihrte
作者: heckle    時間: 2025-3-23 07:43

作者: Insufficient    時間: 2025-3-23 11:20
Budong Xu,Yongqin Li,Xiaomei Yueu gepriigt, angloamerikanische Termini in die traditio- nelle Nomenklatur iibernommen und bekannte Erkrankungen durch verbesserte Untersuchungsmethoden in zahlreiche Varietiiten unter- teilt. Der gleichzeitige, ja teilweise gleichberechtigte Gebrauch alther- gebrachter und neueingefiihrter Krankhei
作者: 歡樂中國    時間: 2025-3-23 15:28

作者: exostosis    時間: 2025-3-23 19:30

作者: 個人長篇演說    時間: 2025-3-23 23:45

作者: Humble    時間: 2025-3-24 05:47

作者: 委屈    時間: 2025-3-24 08:16

作者: 占卜者    時間: 2025-3-24 13:34
Muhammad Aslam,Dengpan Ye,Muhammad Hanif,Muhammad Asadeu gepriigt, angloamerikanische Termini in die traditio- nelle Nomenklatur iibernommen und bekannte Erkrankungen durch verbesserte Untersuchungsmethoden in zahlreiche Varietiiten unter- teilt. Der gleichzeitige, ja teilweise gleichberechtigte Gebrauch alther- gebrachter und neueingefiihrter Krankhei
作者: 錯誤    時間: 2025-3-24 17:20
Yungen Wei,Zheng Gong,Shunzhi Yang,Kai Ye,Yamin Weneu gepriigt, angloamerikanische Termini in die traditio- nelle Nomenklatur iibernommen und bekannte Erkrankungen durch verbesserte Untersuchungsmethoden in zahlreiche Varietiiten unter- teilt. Der gleichzeitige, ja teilweise gleichberechtigte Gebrauch alther- gebrachter und neueingefiihrter Krankhei
作者: expdient    時間: 2025-3-24 22:09
Wu Fan,Zhuoqun Xu,Huanghe Liu,Zhu Zongweirifflich neu gepriigt, angloamerikanische Termini in die traditio- nelle Nomenklatur iibernommen und bekannte Erkrankungen durch verbesserte Untersuchungsmethoden in zahlreiche Varietiiten unter- teilt. Der gleichzeitige, ja teilweise gleichberechtigte Gebrauch alther- gebrachter und neueingefiihrte
作者: 未開化    時間: 2025-3-25 02:04
Shen Jin,Xuesong Liang,Hao Tianrifflich neu gepriigt, angloamerikanische Termini in die traditio- nelle Nomenklatur iibernommen und bekannte Erkrankungen durch verbesserte Untersuchungsmethoden in zahlreiche Varietiiten unter- teilt. Der gleichzeitige, ja teilweise gleichberechtigte Gebrauch alther- gebrachter und neueingefiihrte
作者: 傻    時間: 2025-3-25 04:25
Dynamic Adjusting ABC-SVM Anomaly Detection Based on Weighted Function Code Correlation,odest accomplishments in industrial cyber security. However, a significant issue is how to effectively extract industrial control features which can accurately and comprehensively describe industrial control operations. Aiming at the function code field in industrial Modbus/TCP communication protoco
作者: Deadpan    時間: 2025-3-25 07:57

作者: mortuary    時間: 2025-3-25 12:35

作者: 極小    時間: 2025-3-25 16:16
A Malware Classification Method Based on the Capsule Network,and variants. Dynamic analysis is not efficient when dealing with large amounts of malware. Aiming at the shortcomings of the existing methods, this paper proposes a method for analyzing malware based on the capsule network. It uses a supervised learning method to train the capsule network with a la
作者: 注意到    時間: 2025-3-25 22:23
A Novel Intrusion Detection System for Malware Based on Time-Series Meta-learning,tools leads to reduce the efficiency of CPU or GPU. Meanwhile, they give up active defense and increase the security risk. Unfortunately, the existing intrusion detection systems seldom adjust the defense policy according to the host’s performance and the time when the attack might occur. Thus, diff
作者: Neutral-Spine    時間: 2025-3-26 03:46
DAD: Deep Anomaly Detection for Intelligent Monitoring of Expressway Network,k (IMN) of expressway based on edge computing and deep learning is studied. The video data collected by the camera equipment in the IMN structure of the expressway is transmitted to the edge processing server for screening and then sent to the convolution neural network. Then video data was preproce
作者: Expand    時間: 2025-3-26 04:59
A Two-Phase Cycle Algorithm Based on Multi-objective Genetic Algorithm and Modified BP Neural Network (MBPNN), namely TPC-MOGA-MBPNN, is proposed for effective intrusion detection based on benchmark datasets. In the first phase, the MOGA is employed to build multi-objective optimization model that tries to find Pareto optimal parameter set for MBPNN. The Pareto optimal parameter set is applied fo
作者: 障礙物    時間: 2025-3-26 09:13
An Improved Localization Algorithm Based on Invasive Weed Optimization for WSNs,, key technologies and application models have been widely studied in the industry and academia. As one of its key supporting technologies, localization technology has attracted much attention. In this paper, an improved localization algorithm based on invasive weed optimization is presented and use
作者: 圍裙    時間: 2025-3-26 16:08
A Scientometric Analysis of Malware Detection Research Based on CiteSpace, have been devoting?significant efforts to solve the numerous challenges in malware detection and a large amount of literature available which worthies deeply analyzing and sorting out to offer?guidance?for?the?developmental research on malicious code detection. In this paper, the visualized tool of
作者: DENT    時間: 2025-3-26 18:09
Malware Detection Based on Static and Dynamic Features Analysis,ess of detecting malicious samples. In this paper, the potential malicious features are summarized with their effectiveness in detection. Moreover, the machine learning approaches based on static and dynamic features analysis are studied with both merits and limitations. Finally, possible solutions
作者: MAIM    時間: 2025-3-26 23:17
Classification of Malware Variant Based on Ensemble Learning,learning model. First, malware binary data was transformed into a gray-scale image and the GIST texture feature of the image was extracted. Then, KNN (K Nearest Neighbor) and RF (random forest) method are used as base learners and a malware variant classification model was proposed based on the voti
作者: 游行    時間: 2025-3-27 03:12

作者: 有危險    時間: 2025-3-27 08:36
Spatio-Temporal Graph Convolutional Networks for DDoS Attack Detecting,ernet. Many DDoS detection algorithms based on machine learning technology have emerged in recent years, for example, the LUCID algorithm, GNN model. But considering that DDoS attacks are based on both time and space, these algorithms only considered time and ignored space. Besides, by piece network
作者: esoteric    時間: 2025-3-27 13:16
Cerebral Microbleeds Detection Based on 3D Convolutional Neural Network,n of the location and amount of CMBs in brain tissue is crucial for the diagnosis, prevention and treatment of related diseases, where traditional Convolutional Neural Network (CNN) has been applied but may fail to achieve high enough detection accuracy. To alleviate this issue, we utilize 3D Fully
作者: Obsessed    時間: 2025-3-27 15:14
Liver Tumor Segmentation of CT Image by Using Deep Fully Convolutional Network,f popular method. However, the performance of the traditional convolutional network is limited by the network depth. To improve the accuracy of liver tumor segmentation, we propose a cascaded deep fully convolutional network (DFCN) which uses ResNet as the basis network followed by side output layer
作者: 昏暗    時間: 2025-3-27 19:20

作者: Colonoscopy    時間: 2025-3-27 23:57

作者: crumble    時間: 2025-3-28 05:22

作者: 考博    時間: 2025-3-28 08:05

作者: Outwit    時間: 2025-3-28 14:06

作者: Delectable    時間: 2025-3-28 16:11
A Scientometric Analysis of Malware Detection Research Based on CiteSpace,nt trend in this field concisely and intuitively, which provide the theoretical basis for the in-depth study of malware detection for the scientific research. Finally, the malware detection model is designed according to the analysis results of Mapping Knowledge Domain to achieve effective and efficient performance in malware detection.
作者: 極小    時間: 2025-3-28 19:54
Detection of Malicious Domains in APT via Mining Massive DNS Logs,tures and calculate the score of being malicious from the DNS logs with minimal ground truth. We implement and validate our framework on anonymous DNS logs released by LANL. The experiment shows that our approach identifies previously unknown malicious domains and achieves high detection rates.
作者: patriot    時間: 2025-3-29 02:13
Spatio-Temporal Graph Convolutional Networks for DDoS Attack Detecting,network topology and network traffic, this model has a good recognition rate on the online DDoS data set, and can achieve detection of DDoS attacks under the premise of using only two-way traffic information.
作者: ineptitude    時間: 2025-3-29 04:29
A New Lightweight CRNN Model for Keyword Spotting with Edge Computing Devices,tructure, and it uses a feature enhancement method. The experimental results on Google Speech Commands Dataset depict that EdgeCRNN can test 11.1 audio data per second on Raspberry Pi 3B+, which are 2.2 times that of Tpool2. Compared with Tpool2, the accuracy of EdgeCRNN reaches 98.05% whilst its performance is also competitive.
作者: Extort    時間: 2025-3-29 08:29
Conference proceedings 2020in Xi’an, China in October 2020..The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions. The papers offer a wide range of the following subjects: Machine learning, security, privacy-preserving, cyber security, Adversarial machine Learning,? Malwar
作者: arterioles    時間: 2025-3-29 14:39

作者: 大暴雨    時間: 2025-3-29 18:27

作者: Arbitrary    時間: 2025-3-29 19:50
0302-9743 . The papers offer a wide range of the following subjects: Machine learning, security, privacy-preserving, cyber security, Adversarial machine Learning,? Malware detection and analysis, ?Data mining, and? Artificial Intelligence. .978-3-030-62222-0978-3-030-62223-7Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: Cocker    時間: 2025-3-30 00:46
0302-9743 020, held in Xi’an, China in October 2020..The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions. The papers offer a wide range of the following subjects: Machine learning, security, privacy-preserving, cyber security, Adversarial machine Learnin
作者: 角斗士    時間: 2025-3-30 05:04
An Anomalous Traffic Detection Approach for the Private Network Based on Self-learning Model, its effectiveness and efficiency, a self-learning model is proposed and deployed in the detection approach. Finally, we conduct necessary evaluations about the proposed approach. The test results show that the approach can reach a good effect for detecting the unknown anomalous traffic.
作者: 猜忌    時間: 2025-3-30 08:49
Classification of Malware Variant Based on Ensemble Learning,alware family classification experiment was performed. The results show that the method can reach an accuracy rate of 98.95% and the AUC value of 0.9976, meaning that it can effectively analyze and classify malware variants.
作者: JAMB    時間: 2025-3-30 13:22
Cerebral Microbleeds Detection Based on 3D Convolutional Neural Network,ut using 3D FCN, followed by 3D AlexNet which extracts the spatial features of CMBs and distinguishes the false positive samples from candidate regions. Experimental results show that the proposed method can realize precise detection of CMBs in magnetic resonance images (MRI) by improving detection sensitivity and reducing false positive samples.
作者: 彩色    時間: 2025-3-30 17:32

作者: 壯麗的去    時間: 2025-3-30 22:20

作者: fluffy    時間: 2025-3-31 00:53

作者: 哎呦    時間: 2025-3-31 06:19
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/m/image/620602.jpg
作者: 知識分子    時間: 2025-3-31 12:21
978-3-030-62222-0Springer Nature Switzerland AG 2020
作者: 連系    時間: 2025-3-31 14:18
Machine Learning for Cyber Security978-3-030-62223-7Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: 青石板    時間: 2025-3-31 21:34
Dynamic Adjusting ABC-SVM Anomaly Detection Based on Weighted Function Code Correlation,xperimental results show that the proposed feature extraction algorithm can effectively reflect the changes of functional control behavior in process operations, and the improved ABC-SVM anomaly detection model can improve the detection ability by comparing with other anomaly detection engines.
作者: 連鎖    時間: 2025-3-31 22:51
AndrOpGAN: An Opcode GAN for Android Malware Obfuscations,rted through an Opcode Frequency Optimal Adjustment algorithm (OFOA). OFOA module can keep the APK running normally after insertion with a low modification cost. Test results against four detectors show that more than 99% APKs processed by AndrOpGAN could bypass detections successfully. Test results
作者: 痛苦一生    時間: 2025-4-1 03:15

作者: Mechanics    時間: 2025-4-1 06:13

作者: 有危險    時間: 2025-4-1 13:02
A Two-Phase Cycle Algorithm Based on Multi-objective Genetic Algorithm and Modified BP Neural Netwo termination criteria are reached. Benchmark dataset namely KDD cup 1999 is used to demonstrate and validate the performance of the proposed approach for intrusion detection. The proposed approach can discover a pool of MBPNN based solutions. The MBPNN or MBPNN combination can be used to detect the




歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
秭归县| 隆回县| 石首市| 文登市| 婺源县| 铜梁县| 永平县| 金溪县| 紫云| 宽城| 靖宇县| 敦化市| 民勤县| 湖南省| 沁源县| 夹江县| 滦平县| 正阳县| 横山县| 阳谷县| 阿瓦提县| 马山县| 南宫市| 临颍县| 神木县| 寻甸| 哈尔滨市| 周至县| 余干县| 民乐县| 财经| 呼伦贝尔市| 镇安县| 溧阳市| 新兴县| 香格里拉县| 洛扎县| 奇台县| 定西市| 安平县| 信丰县|