Flu表流动 发表于 2025-3-25 04:58:15

Deployable Machine Learning for Security Defense978-3-030-59621-7Series ISSN 1865-0929 Series E-ISSN 1865-0937

钱财 发表于 2025-3-25 08:27:07

http://reply.papertrans.cn/27/2658/265763/265763_22.png

种植,培养 发表于 2025-3-25 15:11:51

978-3-030-59620-0Springer Nature Switzerland AG 2020

condescend 发表于 2025-3-25 19:40:32

http://reply.papertrans.cn/27/2658/265763/265763_24.png

储备 发表于 2025-3-26 00:02:43

MALOnt: An Ontology for Malware Threat Intelligencen different platforms from scattered threat sources. This collective information can guide decision making in cyber defense applications utilized by security operation centers. In this paper, we introduce an open-source malware ontology, MALOnt that allows the structured extraction of information an

可行 发表于 2025-3-26 03:54:44

: Adaptable Fraud Detection in the Real Worlding:.How suspicious is ‘Smith’, trying to buy $500 shoes, on Monday 3am? How to merge the risk scores, from a handful of risk-assessment modules (‘oracles’) in an adversarial environment? More importantly, given historical data (orders, prices, and what-happened afterwards), and business goals/restr

凶兆 发表于 2025-3-26 06:35:12

http://reply.papertrans.cn/27/2658/265763/265763_27.png

多余 发表于 2025-3-26 08:50:04

Domain Generation Algorithm Detection Utilizing Model Hardening Through GAN-Generated Adversarial Exf hardcoding the address of the C&C domain in the malware, DGAs are used to frequently change the address of the C&C server, causing static detection methods, such as blacklists, to be ineffective. In response, DGA detection methods have been proposed which attempt to detect these DGA-produced domai

goodwill 发表于 2025-3-26 13:24:27

http://reply.papertrans.cn/27/2658/265763/265763_29.png

态度暖昧 发表于 2025-3-26 18:55:58

http://reply.papertrans.cn/27/2658/265763/265763_30.png
页: 1 2 [3] 4
查看完整版本: Titlebook: Deployable Machine Learning for Security Defense; First International Gang Wang,Arridhana Ciptadi,Ali Ahmadzadeh Conference proceedings 20