孵卵器 发表于 2025-3-25 05:35:01
Investigating Deep Learning for Collective Anomaly Detection - An Experimental Study,aches so far proposed for DoS (Denial of Service) attack detection with the aid of collective anomaly detection are unsupervised in nature. Due to this reason, often those approaches show high false alarm rates. To reduce the high false alarm rate, we have done some experiments to investigate the suCpap155 发表于 2025-3-25 10:34:34
BVD - A Blockchain Based Vehicle Database System,for any kind of transaction in terms of goods, services and many more. This technology serves as a secure and transparent platform for the users who wants to change their environment from a centralized to a decentralized platform. Any relevant application which benefits from a decentralized platformConquest 发表于 2025-3-25 14:25:22
http://reply.papertrans.cn/87/8636/863578/863578_23.png特征 发表于 2025-3-25 16:16:04
Security Threats Against LTE Networks: A Survey,itives for authentication and encryption to plug the security holes of earlier generations. But the introduction of IP-based full inter-networking in LTE has increased the attack-surface. Despite strong authentication and encryption, there are still some messages being exchanged over the air, betweebrowbeat 发表于 2025-3-26 00:04:13
Network Anomaly Detection Using Artificial Neural Networks Optimised with PSO-DE Hybrid,y due to the growing Internet is the driving force for coming up with new techniques for detecting anomalies in network behaviour. In this paper, Artificial Neural Network (ANN) model optimised with a hybrid of Particle Swarm Optimiser (PSO) and Differential Evolution (DE) is proposed to monitor theindubitable 发表于 2025-3-26 01:47:43
http://reply.papertrans.cn/87/8636/863578/863578_26.pngMilitia 发表于 2025-3-26 05:56:45
http://reply.papertrans.cn/87/8636/863578/863578_27.png辩论的终结 发表于 2025-3-26 11:30:20
Cost Based Model for Secure Health Care Data Retrieval,sers as chunks by introducing metadata concept. However, data retrieval requires authentication of users and the queries put forth by the user, for which a proper costing mechanism involving both user and query is introduced in this work using linear optimization concept.forager 发表于 2025-3-26 14:51:36
http://reply.papertrans.cn/87/8636/863578/863578_29.png存心 发表于 2025-3-26 19:41:53
Statistical Comparison of Opinion Spam Detectors in Social Media with Imbalanced Datasets,rformance of Twitter spam detection using multiple approaches of single and ensemble classifiers. Besides ensemble-based learning (Bagging and Random forest), we apply the SMOTE oversampling technique to improve detection performance especially for classifiers sensitive to imbalanced datasets.