长矛
发表于 2025-3-23 12:19:48
Deep Hierarchical App Recommendation with Dynamic Behaviors,s limit their performance: (1) Neglect the dynamic change of user preferences in a short time; (2) Singly use either the machining learning or the deep learning method, which cannot learn discrete features or continuous features very well; (3) Directly deal with all apps without considering their hi
conjunctiva
发表于 2025-3-23 14:08:53
http://reply.papertrans.cn/87/8636/863584/863584_12.png
尖叫
发表于 2025-3-23 20:46:58
A Fast Authentication Scheme for Cross-Network-Slicing Based on Multiple Operators in 5G Environmen create a slice with certain unique characteristics. For example: Enhanced Mobile Broadband slicing, Ultra-reliable and Low Latency Communications slicing, etc. However, the traditional authentication mechanism does not address any concrete strategy for network slicing handover in 5G, so that the co
美丽的写
发表于 2025-3-24 01:03:14
http://reply.papertrans.cn/87/8636/863584/863584_14.png
Sinus-Node
发表于 2025-3-24 04:18:46
On the Feasibility of DoS Attack on Smart Door Lock IoT Network, world into a virtual world for testing and emulation to evaluate the key issues present in the physical devices. This work aims to explore the security in IoT devices and demonstrates the security gaps in the behavior of the smart door lock. In this paper, we conducted two surveys to gather consume
Flawless
发表于 2025-3-24 08:18:32
Trust-Based Adversarial Resiliency in Vehicular Cyber Physical Systems Using Reinforcement Learningproved driving experience and birthed systems like cooperative adaptive cruise control, and have formed the foundation for autonomous and platooned vehicles. However, its deployment is adversely affected by security concerns even as attackers continue to improve their attacks methods. In recent year
APRON
发表于 2025-3-24 12:24:01
Benchmarking Behavior-Based Intrusion Detection Systems with Bio-inspired Algorithms,ion to detect and identify zero-day attacks and vulnerabilities exploits. In order to overcome the weaknesses of signature-based IDS, behaviour-based IDS applies a wide set of machine learning technologies to . the normal behaviour of the network, making it possible to detect malicious and not yet s
AVID
发表于 2025-3-24 15:06:43
Thermal Management in Large Data Centres: Security Threats and Mitigation, rapid growth has raised numerous security issues and vulnerabilities; new types of strategic cyber-attacks are aimed at specific physical components of data centres that keep them operating. Attacks against temperature monitoring and cooling systems of data centres, also known as thermal attacks, c
Uncultured
发表于 2025-3-24 21:36:06
Anomaly Detection in CAN-BUS Using Pattern Matching Algorithm,tion to data sharing instead of standalone systems, the susceptibility to systemic vulnerability increases. The automotive intra-communication is based on the CAN (Connected Area Network) network protocol. Many types of research have analyzed the protocol‘s vulnerability to various types of cyber-at
JADED
发表于 2025-3-24 23:33:14
http://reply.papertrans.cn/87/8636/863584/863584_20.png