confide 发表于 2025-3-28 17:38:47

http://reply.papertrans.cn/83/8280/827938/827938_41.png

RAFF 发表于 2025-3-28 22:38:54

http://reply.papertrans.cn/83/8280/827938/827938_42.png

Kidnap 发表于 2025-3-29 01:46:29

http://reply.papertrans.cn/83/8280/827938/827938_43.png

泥沼 发表于 2025-3-29 05:32:07

SybilBlind: Detecting Fake Users in Online Social Networks Without Manual Labelsamount of manually labeled users as a training set. These approaches suffer from three key limitations: (1) it is time-consuming and costly to manually label a large training set, (2) they cannot detect new Sybils in a timely fashion, and (3) they are vulnerable to Sybil attacks that leverage inform

表示向前 发表于 2025-3-29 08:40:19

http://reply.papertrans.cn/83/8280/827938/827938_45.png

ATP861 发表于 2025-3-29 14:54:00

Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networksresources and is often outsourced to third parties. Recent work has shown that outsourced training introduces the risk that a malicious trainer will return a . DNN that behaves normally on most inputs but causes targeted misclassifications or degrades the accuracy of the network when a . known only

品尝你的人 发表于 2025-3-29 16:09:15

http://reply.papertrans.cn/83/8280/827938/827938_47.png

矿石 发表于 2025-3-29 22:05:27

DNS Unchained: Amplified Application-Layer DoS Attacks Against DNS Authoritativesrds with low Time-to-Live values. In essence, this allows a single modern consumer uplink to downgrade availability of large DNS setups. To tackle this new threat, we conclude with an overview of countermeasures and suggestions for DNS servers to limit the impact of DNS chaining attacks.

释放 发表于 2025-3-30 01:04:38

0302-9743 arning for computer security; hardware-assisted security; software security; malware; IoT/CPS security; security measurements; and defenses..978-3-030-00469-9978-3-030-00470-5Series ISSN 0302-9743 Series E-ISSN 1611-3349

offense 发表于 2025-3-30 07:17:22

Conference proceedings 2018zed in the following topical sections: attacks; intrusion detection and prevention; DDoS attacks; passwords, accounts, and users; machine learning for computer security; hardware-assisted security; software security; malware; IoT/CPS security; security measurements; and defenses..
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Research in Attacks, Intrusions, and Defenses; 21st International S Michael Bailey,Thorsten Holz,Sotiris Ioannidis Conference proceedings 2