[图书][B] Advanced Intelligent Computing Technology and Applications: 20th International Conference, ICIC 2024, Tianjin, China, August 5–8, 2024, Proceedings, Part III
DS Huang, Z Si, Q Zhang - 2024 - books.google.com
This 6-volume set LNAI 14875-14880 constitutes-in conjunction with the 13-volume set
LNCS 14862-14874 and the 2-volume set LNBI 14881-14882-the refereed proceedings of …
LNCS 14862-14874 and the 2-volume set LNBI 14881-14882-the refereed proceedings of …
DGA-based Malware Communication Detection from DoH Traffic Using Hierarchical Machine Learning Analysis
R MITSUHASHI, Y JIN, K IIDA, Y TAKAI - IEICE Transactions on …, 2024 - jstage.jst.go.jp
Encrypted domain name resolution is increasingly being used to protect the privacy of
Internet users, but it may prevent network administrators from detecting malicious …
Internet users, but it may prevent network administrators from detecting malicious …
Network Traffic Risk Identification Based on Deep Learning Model
W Zhai, S Liu, Y Yu, W An, J Yu, L Zhang - International Conference on …, 2024 - Springer
In the realm of network traffic analysis, ensuring system security requires accurate
identification of risks posed by various attacks. A notable trend is attackers' exploitation of …
identification of risks posed by various attacks. A notable trend is attackers' exploitation of …
A Survey of Machine Learning Approaches to Cyber Data Breach Detection: Current Challenges and Future Research Directions
Although several machine learning driven solutions are deemed to be effective at detecting
data breaches, the recent proliferation in data breach incidents resulting from cyber attacks …
data breaches, the recent proliferation in data breach incidents resulting from cyber attacks …