Zobrazeno 1 - 10
of 80
pro vyhledávání: '"Hajime Shimada"'
Publikováno v:
IEEE Access, Vol 12, Pp 2648-2659 (2024)
In recent years, with the development of modern network, in order to avoid threats caused by cyber attacks, it is important to understand how to implement effective security measures. Malicious traffic detection is an advanced technique, it employs s
Externí odkaz:
https://doaj.org/article/af7fd673036e44c197d0b9ee5a4dc55a
Publikováno v:
IEEE Access, Vol 11, Pp 112212-112222 (2023)
Currently, with the increasing popularity of high-speed network, in order to protect the network environment, more and more companies start to explore how to efficiently detect malicious traffic. On the software side, traditional detection systems ar
Externí odkaz:
https://doaj.org/article/64b996bc31d643ce9668dcb37c8b39a9
Publikováno v:
IEEE Access, Vol 10, Pp 47792-47804 (2022)
The increased spread of malicious software (malware) through the internet remains a serious threat. Malware authors use obfuscation and deformation techniques to generate new types than can evade traditional detection methods. Hence, it is widely exp
Externí odkaz:
https://doaj.org/article/b57a79b302c24c99954d91d742cf8f7e
Malware Detection by Control-Flow Graph Level Representation Learning With Graph Isomorphism Network
Publikováno v:
IEEE Access, Vol 10, Pp 111830-111841 (2022)
With society’s increasing reliance on computer systems and network technology, the threat of malicious software grows more and more serious. In the field of information security, malware detection has been a key problem that academia and industry a
Externí odkaz:
https://doaj.org/article/e035eaed20334c9f84d9e8ca7750f02d
Publikováno v:
IEEE Access, Vol 8, Pp 177041-177052 (2020)
In order to proactively mitigate cyber-security risks, security analysts have to continuously monitor sources of threat information. However, the sheer amount of textual information that needs to be processed is overwhelming, and it requires a great
Externí odkaz:
https://doaj.org/article/95d9a073ea6d4059ae2fd2463eb67407
Publikováno v:
Journal of Low Power Electronics and Applications, Vol 7, Iss 4, p 32 (2017)
Much research focuses on many-core processors, which possess a vast number of cores. Their area, energy consumption, and performance have a tendency to be proportional to the number of cores. It is better to utilize in-order (IO) execution for better
Externí odkaz:
https://doaj.org/article/702a7a9cfb1a43899e1a9f243c1b34e6
Publikováno v:
2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC).
Publikováno v:
IEEE Access, Vol 8, Pp 177041-177052 (2020)
In order to proactively mitigate cyber-security risks, security analysts have to continuously monitor sources of threat information. However, the sheer amount of textual information that needs to be processed is overwhelming, and it requires a great
Publikováno v:
Journal of Information Processing. 28:623-632
Publikováno v:
Proceedings of the 8th International Conference on Information Systems Security and Privacy.