独轮车 发表于 2025-4-1 05:27:46

http://reply.papertrans.cn/25/2418/241746/241746_61.png

河潭 发表于 2025-4-1 07:36:44

Supervised Detection of Infected Machines Using Anti-virus Induced Labels,t for identifying malware. Using this training set, our detector is able to automatically detect complex and dynamic patterns of suspicious machine behavior and issue high-quality security alerts. We believe that our approach can be used for providing a detection scheme that complements signature-based detection and is harder to circumvent.

FRET 发表于 2025-4-1 11:11:11

http://reply.papertrans.cn/25/2418/241746/241746_63.png

罗盘 发表于 2025-4-1 15:30:53

Stylometric Authorship Attribution of Collaborative Documents,ce. Additionally, we perform authorship attribution of pre-segmented text from the Wikia dataset, and show that while this performs better than multi-label learning it requires large amounts of data to be successful.

使苦恼 发表于 2025-4-1 22:14:29

http://reply.papertrans.cn/25/2418/241746/241746_65.png

不再流行 发表于 2025-4-2 00:39:12

Scalable Attack Path Finding for Increased Security,ng and eliminating optimal attacker paths. Results on an attack graph extracted from a network of a real organization with more than 300 hosts and 2400 vulnerabilities show that using the proposed graph reductions can improve the search time by a factor of 4 while maintaining the quality of the results.

Coma704 发表于 2025-4-2 05:01:54

http://reply.papertrans.cn/25/2418/241746/241746_67.png
页: 1 2 3 4 5 6 [7]
查看完整版本: Titlebook: Cyber Security Cryptography and Machine Learning; First International Shlomi Dolev,Sachin Lodha Conference proceedings 2017 Springer Inter