fastness 发表于 2025-3-26 22:47:38

Human-Machine Decision Support Systems for Insider Threat Detectionithin a dynamic and ever-changing organisation? More recently, there has been interest in how visual analytics can be incorporated with machine-based approaches, to alleviate the data analytics challenges of anomaly detection and to support human reasoning through visual interactive interfaces. Furt

评论者 发表于 2025-3-27 01:10:28

Dynamic Analysis of Malware Using Run-Time Opcodesd as a means of enhancing the feature set. Feature selection was then investigated to tackle the feature explosion which resulted in more than 100,000 features in some cases. As the earliest detection of malware is the most favourable, run-length, i.e. the number of recorded opcodes in a trace, was

GLUT 发表于 2025-3-27 06:07:15

Big Data Analytics for Intrusion Detection System: Statistical Decision-Making Using Finite Dirichleese data to improve the performance of the decision engine. Finally, the decision engine is designed based on the Dirichlet mixture model with a lower-upper interquartile range as decision engine. The performance of this framework is evaluated on two well-known datasets, the NSL-KDD and UNSW-NB15. T

动物 发表于 2025-3-27 12:35:15

Security of Online Examinationsr unauthorized access to sensitive information. In order to prevent such attacks and impersonation threats, we have employed smart techniques of continuous authentication. Therefore, we propose two schemes; Interactive and Secure E-Examination Unit (ISEEU) which is based on video monitoring, and Sma

STALL 发表于 2025-3-27 17:07:29

Attribute Noise, Classification Technique, and Classification Accuracy data about online credit-card transactions. According to the empirical outcomes, we find that the noise hinders the classification accuracy significantly. In addition, the results indicate that the accuracy of data classification depends on the quality of the data and the used classification techni

Genetics 发表于 2025-3-27 20:38:37

Learning from Loads: An Intelligent System for Decision Support in Identifying Nodal Load Disturbanche overall goal of the intelligent system is to provide a degree of possibility as to whether the load demand is legitimate or it has been manipulated in a way that is a threat to the safety of the node and that of the grid in general. The proposed system is tested with real-world data.

archetype 发表于 2025-3-28 02:00:54

Visualization and Data Provenance Trends in Decision Support for Cybersecurity Security visualization showing provenance from a spectrum of data samples on an attack helps researchers to reconstruct the attack from source to destination. This helps identify possible attack patterns and behaviors which results in the creation of effective detection mechanisms and cyber-attacks

Congeal 发表于 2025-3-28 04:38:32

http://reply.papertrans.cn/27/2627/262684/262684_38.png

collagen 发表于 2025-3-28 09:31:06

http://reply.papertrans.cn/27/2627/262684/262684_39.png

compassion 发表于 2025-3-28 11:41:10

Book 2017ises a selection of application-oriented research contributions. The investigations undertaken across these chapters focus on diverse and critical Cybersecurity problems, such as Intrusion Detection, Insider Threats, Insider Threats, Collusion Detection, Run-Time Malware Detection, Intrusion Detecti
页: 1 2 3 [4] 5
查看完整版本: Titlebook: Data Analytics and Decision Support for Cybersecurity; Trends, Methodologie Iván Palomares Carrascosa,Harsha Kumara Kalutarage Book 2017 Sp