CSpace

浏览/检索结果: 共6条,第1-6条 帮助

已选(0)清除 条数/页:   排序方式:
BoAu: Malicious traffic detection with noise labels based on boundary augmentation 期刊论文
COMPUTERS & SECURITY, 2023, 卷号: 131, 页码: 13
作者:  Yuan, Qingjun;  Liu, Chang;  Yu, Wentao;  Zhu, Yuefei;  Xiong, Gang;  Wang, Yongjuan;  Gou, Gaopeng
收藏  |  浏览/下载:7/0  |  提交时间:2023/12/04
Malicious traffic detection  Deep learning  Learning with noise labels  Decision boundaries  Encrypted traffic  
HANDOM: Heterogeneous Attention Network Model for Malicious Domain Detection 期刊论文
COMPUTERS & SECURITY, 2023, 卷号: 125, 页码: 14
作者:  Wang, Qing;  Dong, Cong;  Jian, Shijie;  Du, Dan;  Lu, Zhigang;  Qi, Yinhao;  Han, Dongxu;  Ma, Xiaobo;  Wang, Fei;  Liu, Yuling
收藏  |  浏览/下载:14/0  |  提交时间:2023/07/12
Malware domain detection  Spatial -Temporal contextual correlation  Heterogeneous attention network  Statistical -and -Structural information  
A highly-random hopping sequence for jamming-resilient channel rendezvous in distributed cognitive radio networks 期刊论文
COMPUTERS & SECURITY, 2020, 卷号: 96, 页码: 12
作者:  Yang, Bo
收藏  |  浏览/下载:47/0  |  提交时间:2020/12/10
Cognitive radio networks  Hopping sequences  Distributed rendezvous algorithms  Chinese remainder theorem  Anti-jamming  Information entropy  
Context aware intrusion detection for building automation systems 期刊论文
COMPUTERS & SECURITY, 2019, 卷号: 85, 页码: 181-201
作者:  Pan, Zhiwen;  Hariri, Salim;  Pacheco, Jesus
收藏  |  浏览/下载:76/0  |  提交时间:2019/12/10
Internet of Things  Network security  Context awareness  Supervised learning  Data mining  Intrusion detection  
Causality reasoning about network events for detecting stealthy malware activities 期刊论文
COMPUTERS & SECURITY, 2016, 卷号: 58, 页码: 180-198
作者:  Zhang, Hao;  Yao, Danfeng (Daphne);  Rarnakrishnan, Naren;  Zhang, Zhibin
收藏  |  浏览/下载:42/0  |  提交时间:2019/12/13
Network security  Anomaly detection  Stealthy maiware  Traffic analysis  Dependence analysis  Machine learning classification  
An active learning based TCM-KNN algorithm for supervised network intrusion detection 期刊论文
COMPUTERS & SECURITY, 2007, 卷号: 26, 期号: 7-8, 页码: 459-467
作者:  Li, Yang;  Guo, Li
收藏  |  浏览/下载:39/0  |  提交时间:2019/12/16
network security  intrusion detection  TCM-KNN (Transductive Confidence Machines for K-Nearest Neighbors)  algorithm  machine learning  active learning