標題: Titlebook: Machine Learning for Cyber Security; Third International Xiaofeng Chen,Hongyang Yan,Xiangliang Zhang Conference proceedings 2020 Springer [打印本頁] 作者: introspective 時間: 2025-3-21 19:35
書目名稱Machine Learning for Cyber Security影響因子(影響力)
書目名稱Machine Learning for Cyber Security影響因子(影響力)學(xué)科排名
書目名稱Machine Learning for Cyber Security網(wǎng)絡(luò)公開度
書目名稱Machine Learning for Cyber Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Machine Learning for Cyber Security被引頻次
書目名稱Machine Learning for Cyber Security被引頻次學(xué)科排名
書目名稱Machine Learning for Cyber Security年度引用
書目名稱Machine Learning for Cyber Security年度引用學(xué)科排名
書目名稱Machine Learning for Cyber Security讀者反饋
書目名稱Machine Learning for Cyber Security讀者反饋學(xué)科排名
作者: cutlery 時間: 2025-3-21 20:14
Ming Wan,Jinfang Li,Hao Luo,Kai Wang,Yingjie Wang,Bailing Wangnd supranationaler Arzneibücher.Das Lexikon der Arzneipflanzen und Drogen gibt einen umfassenden überblick über die heute wie auch in früherer Zeit verwendeten Arzneidrogen...Die .3. Auflage. des Lexikons enth?lt ca. 480 neue Artikel inkl. Strukturformeln der Drogeninhaltsstoffe und wurde um das Geb作者: bioavailability 時間: 2025-3-22 00:48 作者: 重畫只能放棄 時間: 2025-3-22 06:54
Weijie Han,Jingfeng Xue,Fuquan Zhang,Yingfeng Zhangnd supranationaler Arzneibücher.Das Lexikon der Arzneipflanzen und Drogen gibt einen umfassenden überblick über die heute wie auch in früherer Zeit verwendeten Arzneidrogen...Die .3. Auflage. des Lexikons enth?lt ca. 480 neue Artikel inkl. Strukturformeln der Drogeninhaltsstoffe und wurde um das Geb作者: 公豬 時間: 2025-3-22 12:05 作者: Prognosis 時間: 2025-3-22 16:26
Fangwei Wang,Shaojie Yang,Changguang Wang,Qingru Lirifflich neu gepriigt, angloamerikanische Termini in die traditio- nelle Nomenklatur iibernommen und bekannte Erkrankungen durch verbesserte Untersuchungsmethoden in zahlreiche Varietiiten unter- teilt. Der gleichzeitige, ja teilweise gleichberechtigte Gebrauch alther- gebrachter und neueingefiihrte作者: hypnotic 時間: 2025-3-22 18:48 作者: 多山 時間: 2025-3-23 00:13
Yiguang Gong,Yunping Liu,Chuanyang Yin,Zhiyong Fanrifflich neu gepriigt, angloamerikanische Termini in die traditio- nelle Nomenklatur iibernommen und bekannte Erkrankungen durch verbesserte Untersuchungsmethoden in zahlreiche Varietiiten unter- teilt. Der gleichzeitige, ja teilweise gleichberechtigte Gebrauch alther- gebrachter und neueingefiihrte作者: convert 時間: 2025-3-23 05:21
Yaming Zhang,Yan Liurifflich neu gepriigt, angloamerikanische Termini in die traditio- nelle Nomenklatur iibernommen und bekannte Erkrankungen durch verbesserte Untersuchungsmethoden in zahlreiche Varietiiten unter- teilt. Der gleichzeitige, ja teilweise gleichberechtigte Gebrauch alther- gebrachter und neueingefiihrte作者: heckle 時間: 2025-3-23 07:43 作者: Insufficient 時間: 2025-3-23 11:20
Budong Xu,Yongqin Li,Xiaomei Yueu gepriigt, angloamerikanische Termini in die traditio- nelle Nomenklatur iibernommen und bekannte Erkrankungen durch verbesserte Untersuchungsmethoden in zahlreiche Varietiiten unter- teilt. Der gleichzeitige, ja teilweise gleichberechtigte Gebrauch alther- gebrachter und neueingefiihrter Krankhei作者: 歡樂中國 時間: 2025-3-23 15:28 作者: exostosis 時間: 2025-3-23 19:30 作者: 個人長篇演說 時間: 2025-3-23 23:45 作者: Humble 時間: 2025-3-24 05:47 作者: 委屈 時間: 2025-3-24 08:16 作者: 占卜者 時間: 2025-3-24 13:34
Muhammad Aslam,Dengpan Ye,Muhammad Hanif,Muhammad Asadeu gepriigt, angloamerikanische Termini in die traditio- nelle Nomenklatur iibernommen und bekannte Erkrankungen durch verbesserte Untersuchungsmethoden in zahlreiche Varietiiten unter- teilt. Der gleichzeitige, ja teilweise gleichberechtigte Gebrauch alther- gebrachter und neueingefiihrter Krankhei作者: 錯誤 時間: 2025-3-24 17:20
Yungen Wei,Zheng Gong,Shunzhi Yang,Kai Ye,Yamin Weneu gepriigt, angloamerikanische Termini in die traditio- nelle Nomenklatur iibernommen und bekannte Erkrankungen durch verbesserte Untersuchungsmethoden in zahlreiche Varietiiten unter- teilt. Der gleichzeitige, ja teilweise gleichberechtigte Gebrauch alther- gebrachter und neueingefiihrter Krankhei作者: expdient 時間: 2025-3-24 22:09
Wu Fan,Zhuoqun Xu,Huanghe Liu,Zhu Zongweirifflich neu gepriigt, angloamerikanische Termini in die traditio- nelle Nomenklatur iibernommen und bekannte Erkrankungen durch verbesserte Untersuchungsmethoden in zahlreiche Varietiiten unter- teilt. Der gleichzeitige, ja teilweise gleichberechtigte Gebrauch alther- gebrachter und neueingefiihrte作者: 未開化 時間: 2025-3-25 02:04
Shen Jin,Xuesong Liang,Hao Tianrifflich neu gepriigt, angloamerikanische Termini in die traditio- nelle Nomenklatur iibernommen und bekannte Erkrankungen durch verbesserte Untersuchungsmethoden in zahlreiche Varietiiten unter- teilt. Der gleichzeitige, ja teilweise gleichberechtigte Gebrauch alther- gebrachter und neueingefiihrte作者: 傻 時間: 2025-3-25 04:25
Dynamic Adjusting ABC-SVM Anomaly Detection Based on Weighted Function Code Correlation,odest accomplishments in industrial cyber security. However, a significant issue is how to effectively extract industrial control features which can accurately and comprehensively describe industrial control operations. Aiming at the function code field in industrial Modbus/TCP communication protoco作者: Deadpan 時間: 2025-3-25 07:57 作者: mortuary 時間: 2025-3-25 12:35 作者: 極小 時間: 2025-3-25 16:16
A Malware Classification Method Based on the Capsule Network,and variants. Dynamic analysis is not efficient when dealing with large amounts of malware. Aiming at the shortcomings of the existing methods, this paper proposes a method for analyzing malware based on the capsule network. It uses a supervised learning method to train the capsule network with a la作者: 注意到 時間: 2025-3-25 22:23
A Novel Intrusion Detection System for Malware Based on Time-Series Meta-learning,tools leads to reduce the efficiency of CPU or GPU. Meanwhile, they give up active defense and increase the security risk. Unfortunately, the existing intrusion detection systems seldom adjust the defense policy according to the host’s performance and the time when the attack might occur. Thus, diff作者: Neutral-Spine 時間: 2025-3-26 03:46
DAD: Deep Anomaly Detection for Intelligent Monitoring of Expressway Network,k (IMN) of expressway based on edge computing and deep learning is studied. The video data collected by the camera equipment in the IMN structure of the expressway is transmitted to the edge processing server for screening and then sent to the convolution neural network. Then video data was preproce作者: Expand 時間: 2025-3-26 04:59
A Two-Phase Cycle Algorithm Based on Multi-objective Genetic Algorithm and Modified BP Neural Network (MBPNN), namely TPC-MOGA-MBPNN, is proposed for effective intrusion detection based on benchmark datasets. In the first phase, the MOGA is employed to build multi-objective optimization model that tries to find Pareto optimal parameter set for MBPNN. The Pareto optimal parameter set is applied fo作者: 障礙物 時間: 2025-3-26 09:13
An Improved Localization Algorithm Based on Invasive Weed Optimization for WSNs,, key technologies and application models have been widely studied in the industry and academia. As one of its key supporting technologies, localization technology has attracted much attention. In this paper, an improved localization algorithm based on invasive weed optimization is presented and use作者: 圍裙 時間: 2025-3-26 16:08
A Scientometric Analysis of Malware Detection Research Based on CiteSpace, have been devoting?significant efforts to solve the numerous challenges in malware detection and a large amount of literature available which worthies deeply analyzing and sorting out to offer?guidance?for?the?developmental research on malicious code detection. In this paper, the visualized tool of作者: DENT 時間: 2025-3-26 18:09
Malware Detection Based on Static and Dynamic Features Analysis,ess of detecting malicious samples. In this paper, the potential malicious features are summarized with their effectiveness in detection. Moreover, the machine learning approaches based on static and dynamic features analysis are studied with both merits and limitations. Finally, possible solutions 作者: MAIM 時間: 2025-3-26 23:17
Classification of Malware Variant Based on Ensemble Learning,learning model. First, malware binary data was transformed into a gray-scale image and the GIST texture feature of the image was extracted. Then, KNN (K Nearest Neighbor) and RF (random forest) method are used as base learners and a malware variant classification model was proposed based on the voti作者: 游行 時間: 2025-3-27 03:12 作者: 有危險 時間: 2025-3-27 08:36
Spatio-Temporal Graph Convolutional Networks for DDoS Attack Detecting,ernet. Many DDoS detection algorithms based on machine learning technology have emerged in recent years, for example, the LUCID algorithm, GNN model. But considering that DDoS attacks are based on both time and space, these algorithms only considered time and ignored space. Besides, by piece network作者: esoteric 時間: 2025-3-27 13:16
Cerebral Microbleeds Detection Based on 3D Convolutional Neural Network,n of the location and amount of CMBs in brain tissue is crucial for the diagnosis, prevention and treatment of related diseases, where traditional Convolutional Neural Network (CNN) has been applied but may fail to achieve high enough detection accuracy. To alleviate this issue, we utilize 3D Fully 作者: Obsessed 時間: 2025-3-27 15:14
Liver Tumor Segmentation of CT Image by Using Deep Fully Convolutional Network,f popular method. However, the performance of the traditional convolutional network is limited by the network depth. To improve the accuracy of liver tumor segmentation, we propose a cascaded deep fully convolutional network (DFCN) which uses ResNet as the basis network followed by side output layer作者: 昏暗 時間: 2025-3-27 19:20 作者: Colonoscopy 時間: 2025-3-27 23:57 作者: crumble 時間: 2025-3-28 05:22 作者: 考博 時間: 2025-3-28 08:05 作者: Outwit 時間: 2025-3-28 14:06 作者: Delectable 時間: 2025-3-28 16:11
A Scientometric Analysis of Malware Detection Research Based on CiteSpace,nt trend in this field concisely and intuitively, which provide the theoretical basis for the in-depth study of malware detection for the scientific research. Finally, the malware detection model is designed according to the analysis results of Mapping Knowledge Domain to achieve effective and efficient performance in malware detection.作者: 極小 時間: 2025-3-28 19:54
Detection of Malicious Domains in APT via Mining Massive DNS Logs,tures and calculate the score of being malicious from the DNS logs with minimal ground truth. We implement and validate our framework on anonymous DNS logs released by LANL. The experiment shows that our approach identifies previously unknown malicious domains and achieves high detection rates.作者: patriot 時間: 2025-3-29 02:13
Spatio-Temporal Graph Convolutional Networks for DDoS Attack Detecting,network topology and network traffic, this model has a good recognition rate on the online DDoS data set, and can achieve detection of DDoS attacks under the premise of using only two-way traffic information.作者: ineptitude 時間: 2025-3-29 04:29
A New Lightweight CRNN Model for Keyword Spotting with Edge Computing Devices,tructure, and it uses a feature enhancement method. The experimental results on Google Speech Commands Dataset depict that EdgeCRNN can test 11.1 audio data per second on Raspberry Pi 3B+, which are 2.2 times that of Tpool2. Compared with Tpool2, the accuracy of EdgeCRNN reaches 98.05% whilst its performance is also competitive.作者: Extort 時間: 2025-3-29 08:29
Conference proceedings 2020in Xi’an, China in October 2020..The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions. The papers offer a wide range of the following subjects: Machine learning, security, privacy-preserving, cyber security, Adversarial machine Learning,? Malwar作者: arterioles 時間: 2025-3-29 14:39 作者: 大暴雨 時間: 2025-3-29 18:27 作者: Arbitrary 時間: 2025-3-29 19:50
0302-9743 . The papers offer a wide range of the following subjects: Machine learning, security, privacy-preserving, cyber security, Adversarial machine Learning,? Malware detection and analysis, ?Data mining, and? Artificial Intelligence. .978-3-030-62222-0978-3-030-62223-7Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: Cocker 時間: 2025-3-30 00:46
0302-9743 020, held in Xi’an, China in October 2020..The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions. The papers offer a wide range of the following subjects: Machine learning, security, privacy-preserving, cyber security, Adversarial machine Learnin作者: 角斗士 時間: 2025-3-30 05:04
An Anomalous Traffic Detection Approach for the Private Network Based on Self-learning Model, its effectiveness and efficiency, a self-learning model is proposed and deployed in the detection approach. Finally, we conduct necessary evaluations about the proposed approach. The test results show that the approach can reach a good effect for detecting the unknown anomalous traffic.作者: 猜忌 時間: 2025-3-30 08:49
Classification of Malware Variant Based on Ensemble Learning,alware family classification experiment was performed. The results show that the method can reach an accuracy rate of 98.95% and the AUC value of 0.9976, meaning that it can effectively analyze and classify malware variants.作者: JAMB 時間: 2025-3-30 13:22
Cerebral Microbleeds Detection Based on 3D Convolutional Neural Network,ut using 3D FCN, followed by 3D AlexNet which extracts the spatial features of CMBs and distinguishes the false positive samples from candidate regions. Experimental results show that the proposed method can realize precise detection of CMBs in magnetic resonance images (MRI) by improving detection sensitivity and reducing false positive samples.作者: 彩色 時間: 2025-3-30 17:32 作者: 壯麗的去 時間: 2025-3-30 22:20 作者: fluffy 時間: 2025-3-31 00:53 作者: 哎呦 時間: 2025-3-31 06:19
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/m/image/620602.jpg作者: 知識分子 時間: 2025-3-31 12:21
978-3-030-62222-0Springer Nature Switzerland AG 2020作者: 連系 時間: 2025-3-31 14:18
Machine Learning for Cyber Security978-3-030-62223-7Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 青石板 時間: 2025-3-31 21:34
Dynamic Adjusting ABC-SVM Anomaly Detection Based on Weighted Function Code Correlation,xperimental results show that the proposed feature extraction algorithm can effectively reflect the changes of functional control behavior in process operations, and the improved ABC-SVM anomaly detection model can improve the detection ability by comparing with other anomaly detection engines.作者: 連鎖 時間: 2025-3-31 22:51
AndrOpGAN: An Opcode GAN for Android Malware Obfuscations,rted through an Opcode Frequency Optimal Adjustment algorithm (OFOA). OFOA module can keep the APK running normally after insertion with a low modification cost. Test results against four detectors show that more than 99% APKs processed by AndrOpGAN could bypass detections successfully. Test results作者: 痛苦一生 時間: 2025-4-1 03:15 作者: Mechanics 時間: 2025-4-1 06:13 作者: 有危險 時間: 2025-4-1 13:02
A Two-Phase Cycle Algorithm Based on Multi-objective Genetic Algorithm and Modified BP Neural Netwo termination criteria are reached. Benchmark dataset namely KDD cup 1999 is used to demonstrate and validate the performance of the proposed approach for intrusion detection. The proposed approach can discover a pool of MBPNN based solutions. The MBPNN or MBPNN combination can be used to detect the