Zobrazeno 1 - 10
of 3 288
pro vyhledávání: '"Troia, A"'
Publikováno v:
Expert Systems with Applications, Volume 125, 1 July 2019, Pages 130-141
In recent years there has been a dramatic increase in the number of malware attacks that use encrypted HTTP traffic for self-propagation or communication. Antivirus software and firewalls typically will not have access to encryption keys, and therefo
Externí odkaz:
http://arxiv.org/abs/2312.04596
Autor:
Raghuvir, Yuvaray Athur, Govindarajan, Senthil, Vijayakumar, Sanjeevi, Yadlapalli, Pradeep, Di Troia, Fabio
Publikováno v:
Proceedings of the Future Technologies Conference (FTC) 2021, Volume 3. Springer International Publishing, 2022
Secure computation protocols combine inputs from involved parties to generate an output while keeping their inputs private. Private Set Intersection (PSI) is a secure computation protocol that allows two parties, who each hold a set of items, to lear
Externí odkaz:
http://arxiv.org/abs/2308.14741
Effective and efficient malware detection is at the forefront of research into building secure digital systems. As with many other fields, malware detection research has seen a dramatic increase in the application of machine learning algorithms. One
Externí odkaz:
http://arxiv.org/abs/2307.10256
Machine learning is becoming increasingly popular as a go-to approach for many tasks due to its world-class results. As a result, antivirus developers are incorporating machine learning models into their products. While these models improve malware d
Externí odkaz:
http://arxiv.org/abs/2306.13587
A large amount of new malware is constantly being generated, which must not only be distinguished from benign samples, but also classified into malware families. For this purpose, investigating how existing malware families are developed and examinin
Externí odkaz:
http://arxiv.org/abs/2305.00605
Autor:
Müller, Jasper, Slyne, Frank, Kaeval, Kaida, Troia, Sebastian, Fehenberger, Tobias, Elbers, Jörg-Peter, Kilper, Daniel C., Ruffini, Marco, Mas-Machuca, Carmen
SNR margins between partially and fully loaded DWDM systems are estimated without detailed knowledge of the network. The ML model, trained on simulation data, achieves accurate predictions on experimental data with an RMSE of 0.16 dB.
Comment: T
Comment: T
Externí odkaz:
http://arxiv.org/abs/2302.08275
Autor:
Kaeval, K., Slyne, F., Troia, S., Kenny, E., Große, K., Griesser, H., Kilper, D. C., Ruffini, M., Pedreno-Manresa, J-J, Patri, S. K., Jervan, G.
Optical Spectrum as a Service (OSaaS) spanning over multiple transparent optical network domains, can significantly reduce the investment and operational costs of the end-to-end service. Based on the black-link approach, these services are empowered
Externí odkaz:
http://arxiv.org/abs/2302.04623
Autor:
Anthony E. Bishay, BS, Arman J. Fijany, MD, Cole Holan, MD, MBA, Ronnie N. Mubang, MD, Lisandro Montorfano, MD, Sofia E. Olsson, BS, Thomas Troia, BS, MS, Arash Bakian, BS, MS, Salam Al Kassis, MD, Bill V. Tran, MD
Publikováno v:
Plastic and Reconstructive Surgery, Global Open, Vol 12, Iss 7, p e5996 (2024)
Background:. Nurtec, a versatile migraine medication, has gained popularity. However, the awareness of migraine surgery remains uncertain. Methods:. Following a descriptive approach, this cross-sectional study used Google Trends data as of December 1
Externí odkaz:
https://doaj.org/article/54dc791a265d4fca9b33c91363758d09
When training a machine learning model, there is likely to be a tradeoff between accuracy and the diversity of the dataset. Previous research has shown that if we train a model to detect one specific malware family, we generally obtain stronger resul
Externí odkaz:
http://arxiv.org/abs/2207.00620
For efficient malware removal, determination of malware threat levels, and damage estimation, malware family classification plays a critical role. In this paper, we extract features from malware executable files and represent them as images using var
Externí odkaz:
http://arxiv.org/abs/2207.00421