孵卵器 发表于 2025-3-25 05:35:01

Investigating Deep Learning for Collective Anomaly Detection - An Experimental Study,aches so far proposed for DoS (Denial of Service) attack detection with the aid of collective anomaly detection are unsupervised in nature. Due to this reason, often those approaches show high false alarm rates. To reduce the high false alarm rate, we have done some experiments to investigate the su

Cpap155 发表于 2025-3-25 10:34:34

BVD - A Blockchain Based Vehicle Database System,for any kind of transaction in terms of goods, services and many more. This technology serves as a secure and transparent platform for the users who wants to change their environment from a centralized to a decentralized platform. Any relevant application which benefits from a decentralized platform

Conquest 发表于 2025-3-25 14:25:22

http://reply.papertrans.cn/87/8636/863578/863578_23.png

特征 发表于 2025-3-25 16:16:04

Security Threats Against LTE Networks: A Survey,itives for authentication and encryption to plug the security holes of earlier generations. But the introduction of IP-based full inter-networking in LTE has increased the attack-surface. Despite strong authentication and encryption, there are still some messages being exchanged over the air, betwee

browbeat 发表于 2025-3-26 00:04:13

Network Anomaly Detection Using Artificial Neural Networks Optimised with PSO-DE Hybrid,y due to the growing Internet is the driving force for coming up with new techniques for detecting anomalies in network behaviour. In this paper, Artificial Neural Network (ANN) model optimised with a hybrid of Particle Swarm Optimiser (PSO) and Differential Evolution (DE) is proposed to monitor the

indubitable 发表于 2025-3-26 01:47:43

http://reply.papertrans.cn/87/8636/863578/863578_26.png

Militia 发表于 2025-3-26 05:56:45

http://reply.papertrans.cn/87/8636/863578/863578_27.png

辩论的终结 发表于 2025-3-26 11:30:20

Cost Based Model for Secure Health Care Data Retrieval,sers as chunks by introducing metadata concept. However, data retrieval requires authentication of users and the queries put forth by the user, for which a proper costing mechanism involving both user and query is introduced in this work using linear optimization concept.

forager 发表于 2025-3-26 14:51:36

http://reply.papertrans.cn/87/8636/863578/863578_29.png

存心 发表于 2025-3-26 19:41:53

Statistical Comparison of Opinion Spam Detectors in Social Media with Imbalanced Datasets,rformance of Twitter spam detection using multiple approaches of single and ensemble classifiers. Besides ensemble-based learning (Bagging and Random forest), we apply the SMOTE oversampling technique to improve detection performance especially for classifiers sensitive to imbalanced datasets.
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Security in Computing and Communications; 6th International Sy Sabu M. Thampi,Sanjay Madria,Jose M. Alcaraz Caler Conference proceedings 20