HAIRY 发表于 2025-3-28 18:15:40

http://reply.papertrans.cn/25/2418/241737/241737_41.png

泄露 发表于 2025-3-28 21:27:35

https://doi.org/10.1007/978-981-16-3041-5ult interpretable. To enhance the generalization ability of the model, this paper proposes a novel feature extraction method. Experiments show that DeepHTTP has an excellent performance in malicious traffic discrimination and pattern mining.

哀悼 发表于 2025-3-29 02:00:49

http://reply.papertrans.cn/25/2418/241737/241737_43.png

explicit 发表于 2025-3-29 05:40:07

A Secure Ranked Search Model Over Encrypted Data in Hybrid Cloud Computingipher text is transferred to the trustworthy private cloud, in which the decrypting are performed. The client does not need to perform any heavy computations, thence making the secure ranking practical from the client’s point of view.

玩笑 发表于 2025-3-29 07:43:31

http://reply.papertrans.cn/25/2418/241737/241737_45.png

夹克怕包裹 发表于 2025-3-29 13:42:49

http://reply.papertrans.cn/25/2418/241737/241737_46.png

行为 发表于 2025-3-29 16:22:18

Research Status and Prospect of Blockchain Technology in Agriculture Field core, it describes the application of blockchain technology in the agricultural field, and further explores solutions to different application problems. Finally, combined with the practical application of “agriculture + blockchain”, relevant Suggestions are proposed to provide reference for cross-disciplinary research.

四溢 发表于 2025-3-29 20:00:28

http://reply.papertrans.cn/25/2418/241737/241737_48.png

性冷淡 发表于 2025-3-30 02:25:05

DeepHTTP: Anomalous HTTP Traffic Detection and Malicious Pattern Mining Based on Deep Learningult interpretable. To enhance the generalization ability of the model, this paper proposes a novel feature extraction method. Experiments show that DeepHTTP has an excellent performance in malicious traffic discrimination and pattern mining.
页: 1 2 3 4 [5]
查看完整版本: Titlebook: Cyber Security; 17th China Annual Co Wei Lu,Qiaoyan Wen,Yu Zhou Conference proceedings‘‘‘‘‘‘‘‘ 2020 The Editor(s) (if applicable) and The A