傻 发表于 2025-3-25 04:25:42
Dynamic Adjusting ABC-SVM Anomaly Detection Based on Weighted Function Code Correlation,odest accomplishments in industrial cyber security. However, a significant issue is how to effectively extract industrial control features which can accurately and comprehensively describe industrial control operations. Aiming at the function code field in industrial Modbus/TCP communication protocoDeadpan 发表于 2025-3-25 07:57:11
http://reply.papertrans.cn/63/6207/620602/620602_22.pngmortuary 发表于 2025-3-25 12:35:07
http://reply.papertrans.cn/63/6207/620602/620602_23.png极小 发表于 2025-3-25 16:16:48
A Malware Classification Method Based on the Capsule Network,and variants. Dynamic analysis is not efficient when dealing with large amounts of malware. Aiming at the shortcomings of the existing methods, this paper proposes a method for analyzing malware based on the capsule network. It uses a supervised learning method to train the capsule network with a la注意到 发表于 2025-3-25 22:23:08
A Novel Intrusion Detection System for Malware Based on Time-Series Meta-learning,tools leads to reduce the efficiency of CPU or GPU. Meanwhile, they give up active defense and increase the security risk. Unfortunately, the existing intrusion detection systems seldom adjust the defense policy according to the host’s performance and the time when the attack might occur. Thus, diffNeutral-Spine 发表于 2025-3-26 03:46:07
DAD: Deep Anomaly Detection for Intelligent Monitoring of Expressway Network,k (IMN) of expressway based on edge computing and deep learning is studied. The video data collected by the camera equipment in the IMN structure of the expressway is transmitted to the edge processing server for screening and then sent to the convolution neural network. Then video data was preproceExpand 发表于 2025-3-26 04:59:14
A Two-Phase Cycle Algorithm Based on Multi-objective Genetic Algorithm and Modified BP Neural Network (MBPNN), namely TPC-MOGA-MBPNN, is proposed for effective intrusion detection based on benchmark datasets. In the first phase, the MOGA is employed to build multi-objective optimization model that tries to find Pareto optimal parameter set for MBPNN. The Pareto optimal parameter set is applied fo障碍物 发表于 2025-3-26 09:13:04
An Improved Localization Algorithm Based on Invasive Weed Optimization for WSNs,, key technologies and application models have been widely studied in the industry and academia. As one of its key supporting technologies, localization technology has attracted much attention. In this paper, an improved localization algorithm based on invasive weed optimization is presented and use围裙 发表于 2025-3-26 16:08:45
A Scientometric Analysis of Malware Detection Research Based on CiteSpace, have been devoting significant efforts to solve the numerous challenges in malware detection and a large amount of literature available which worthies deeply analyzing and sorting out to offer guidance for the developmental research on malicious code detection. In this paper, the visualized tool ofDENT 发表于 2025-3-26 18:09:14
Malware Detection Based on Static and Dynamic Features Analysis,ess of detecting malicious samples. In this paper, the potential malicious features are summarized with their effectiveness in detection. Moreover, the machine learning approaches based on static and dynamic features analysis are studied with both merits and limitations. Finally, possible solutions