Zobrazeno 1 - 10
of 128
pro vyhledávání: '"Han, Lansheng"'
CLNX: Bridging Code and Natural Language for C/C++ Vulnerability-Contributing Commits Identification
Large Language Models (LLMs) have shown great promise in vulnerability identification. As C/C++ comprises half of the Open-Source Software (OSS) vulnerabilities over the past decade and updates in OSS mainly occur through commits, enhancing LLMs' abi
Externí odkaz:
http://arxiv.org/abs/2409.07407
Webshell, as the "culprit" behind numerous network attacks, is one of the research hotspots in the field of cybersecurity. However, the complexity, stealthiness, and confusing nature of webshells pose significant challenges to the corresponding detec
Externí odkaz:
http://arxiv.org/abs/2405.00066
Multivariate Time Series (MTS) anomaly detection focuses on pinpointing samples that diverge from standard operational patterns, which is crucial for ensuring the safety and security of industrial applications. The primary challenge in this domain is
Externí odkaz:
http://arxiv.org/abs/2404.08224
Accurate detection and diagnosis of abnormal behaviors such as network attacks from multivariate time series (MTS) are crucial for ensuring the stable and effective operation of industrial cyber-physical systems (CPS). However, existing researches pa
Externí odkaz:
http://arxiv.org/abs/2403.02616
Transformer, as one of the most advanced neural network models in Natural Language Processing (NLP), exhibits diverse applications in the field of anomaly detection. To inspire research on Transformer-based anomaly detection, this review offers a fre
Externí odkaz:
http://arxiv.org/abs/2402.08975
The frequent occurrence of cyber-attacks has made webshell attacks and defense gradually become a research hotspot in the field of network security. However, the lack of publicly available benchmark datasets and the over-reliance on manually defined
Externí odkaz:
http://arxiv.org/abs/2402.07408
Publikováno v:
Computers & Security, 2023, 103570
Deep generative models are promising in detecting novel cyber-physical attacks, mitigating the vulnerability of Cyber-physical systems (CPSs) without relying on labeled information. Nonetheless, these generative models face challenges in identifying
Externí odkaz:
http://arxiv.org/abs/2311.02378
The rapid development of Industry 4.0 has amplified the scope and destructiveness of industrial Cyber-Physical System (CPS) by network attacks. Anomaly detection techniques are employed to identify these attacks and guarantee the normal operation of
Externí odkaz:
http://arxiv.org/abs/2302.10601
The feature diversity of different web systems in page elements, submission contents and return information makes it difficult to detect weak password automatically. To solve this problem, multi-factor correlation detection method as integrated in th
Externí odkaz:
http://arxiv.org/abs/2210.14582
TOR (The Onion Router) network is a widely used open source anonymous communication tool, the abuse of TOR makes it difficult to monitor the proliferation of online crimes such as to access criminal websites. Most existing approches for TOR network d
Externí odkaz:
http://arxiv.org/abs/2209.12482