[图书][B] Advanced Intelligent Computing Technology and Applications: 20th International Conference, ICIC 2024, Tianjin, China, August 5–8, 2024, Proceedings, Part III

DS Huang, Z Si, Q Zhang - 2024 - books.google.com
This 6-volume set LNAI 14875-14880 constitutes-in conjunction with the 13-volume set
LNCS 14862-14874 and the 2-volume set LNBI 14881-14882-the refereed proceedings of …

DGA-based Malware Communication Detection from DoH Traffic Using Hierarchical Machine Learning Analysis

R MITSUHASHI, Y JIN, K IIDA, Y TAKAI - IEICE Transactions on …, 2024 - jstage.jst.go.jp
Encrypted domain name resolution is increasingly being used to protect the privacy of
Internet users, but it may prevent network administrators from detecting malicious …

Network Traffic Risk Identification Based on Deep Learning Model

W Zhai, S Liu, Y Yu, W An, J Yu, L Zhang - International Conference on …, 2024 - Springer
In the realm of network traffic analysis, ensuring system security requires accurate
identification of risks posed by various attacks. A notable trend is attackers' exploitation of …

A Survey of Machine Learning Approaches to Cyber Data Breach Detection: Current Challenges and Future Research Directions

P Yeboah, ASM Kayes, W Rahayu, E Pardede… - Authorea Preprints - techrxiv.org
Although several machine learning driven solutions are deemed to be effective at detecting
data breaches, the recent proliferation in data breach incidents resulting from cyber attacks …