找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Cyberspace Safety and Security; 11th International S Jaideep Vaidya,Xiao Zhang,Jin Li Conference proceedings 2019 Springer Nature Switzerla

[复制链接]
楼主: 郊区
发表于 2025-3-27 00:43:55 | 显示全部楼层
Boosting Training for PDF Malware Classifier via Active Learningized as a vehicle for malicious behavior. In this paper, machine learning algorithm will be used to detect malicious PDF document, and evaluated on experimental data. The main work of this paper is to implement a malware detection method, which utilizes static pre-processing and machine learning alg
发表于 2025-3-27 01:42:47 | 显示全部楼层
发表于 2025-3-27 09:02:38 | 显示全部楼层
DeepWAF: Detecting Web Attacks Based on CNN and LSTM Modelsnformation processing and sharing by web applications, the situation for web attack detection or prevention becomes increasingly severe. We present a prototype implementation called DeepWAF to detect web attacks based on deep learning techniques. We systematically discuss the approach for effective
发表于 2025-3-27 12:18:09 | 显示全部楼层
Research on Intrusion Detection Based on Semantic Re-encoding and Multi-space Projection The accuracy of the traditional rule-based intrusion detection system is affected. And the false alarm rate of machine learning-based intrusion detection system is high due to the lack of causal link analysis among sampled data and attack events. Aiming at the problem, this paper proposes an intell
发表于 2025-3-27 15:58:15 | 显示全部楼层
Software Defect Prediction Model Based on GA-BP Algorithmted for Back Propagation) neural network, which has the problem of easy to fall into local optimization when constructing software defect prediction model, and finally affects the prediction accuracy. Firstly, the optimization ability of GA (abbreviated for Genetic Algorithms) is introduced to optim
发表于 2025-3-27 19:28:02 | 显示全部楼层
Security Solution Based on Raspberry PI and IoTwith the aid of cloud and wireless sensor communication technologies. In this paper, the capabilities and limitations of smart home systems were researched. The project built a smart Internet of Things (IoT) system for the security of the home. This project uses inexpensive and commercially availabl
发表于 2025-3-27 22:49:26 | 显示全部楼层
发表于 2025-3-28 02:29:34 | 显示全部楼层
Research on K-Means Clustering Algorithm Over Encrypted Datas++ that uses the idea of homomorphic encryption to solve the encrypted data multiplication problems, distance calculation problems and the comparison problems. Then apply these security protocols to the improved clustering algorithm framework. To prevent the leakage of privacy while calculating the
发表于 2025-3-28 07:02:43 | 显示全部楼层
发表于 2025-3-28 13:43:15 | 显示全部楼层
Studies in Educational Leadershipeamforming information table and location consistency of its neighbors after the beam training process. An attack will be declared if an inconsistency is found by a legitimate node in the network. To validate the effectiveness of the algorithms, a simulator is developed and a series of simulations a
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-15 08:27
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表