长矛 发表于 2025-3-23 12:19:48
Deep Hierarchical App Recommendation with Dynamic Behaviors,s limit their performance: (1) Neglect the dynamic change of user preferences in a short time; (2) Singly use either the machining learning or the deep learning method, which cannot learn discrete features or continuous features very well; (3) Directly deal with all apps without considering their hiconjunctiva 发表于 2025-3-23 14:08:53
http://reply.papertrans.cn/87/8636/863584/863584_12.png尖叫 发表于 2025-3-23 20:46:58
A Fast Authentication Scheme for Cross-Network-Slicing Based on Multiple Operators in 5G Environmen create a slice with certain unique characteristics. For example: Enhanced Mobile Broadband slicing, Ultra-reliable and Low Latency Communications slicing, etc. However, the traditional authentication mechanism does not address any concrete strategy for network slicing handover in 5G, so that the co美丽的写 发表于 2025-3-24 01:03:14
http://reply.papertrans.cn/87/8636/863584/863584_14.pngSinus-Node 发表于 2025-3-24 04:18:46
On the Feasibility of DoS Attack on Smart Door Lock IoT Network, world into a virtual world for testing and emulation to evaluate the key issues present in the physical devices. This work aims to explore the security in IoT devices and demonstrates the security gaps in the behavior of the smart door lock. In this paper, we conducted two surveys to gather consumeFlawless 发表于 2025-3-24 08:18:32
Trust-Based Adversarial Resiliency in Vehicular Cyber Physical Systems Using Reinforcement Learningproved driving experience and birthed systems like cooperative adaptive cruise control, and have formed the foundation for autonomous and platooned vehicles. However, its deployment is adversely affected by security concerns even as attackers continue to improve their attacks methods. In recent yearAPRON 发表于 2025-3-24 12:24:01
Benchmarking Behavior-Based Intrusion Detection Systems with Bio-inspired Algorithms,ion to detect and identify zero-day attacks and vulnerabilities exploits. In order to overcome the weaknesses of signature-based IDS, behaviour-based IDS applies a wide set of machine learning technologies to . the normal behaviour of the network, making it possible to detect malicious and not yet sAVID 发表于 2025-3-24 15:06:43
Thermal Management in Large Data Centres: Security Threats and Mitigation, rapid growth has raised numerous security issues and vulnerabilities; new types of strategic cyber-attacks are aimed at specific physical components of data centres that keep them operating. Attacks against temperature monitoring and cooling systems of data centres, also known as thermal attacks, cUncultured 发表于 2025-3-24 21:36:06
Anomaly Detection in CAN-BUS Using Pattern Matching Algorithm,tion to data sharing instead of standalone systems, the susceptibility to systemic vulnerability increases. The automotive intra-communication is based on the CAN (Connected Area Network) network protocol. Many types of research have analyzed the protocol‘s vulnerability to various types of cyber-atJADED 发表于 2025-3-24 23:33:14
http://reply.papertrans.cn/87/8636/863584/863584_20.png