Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Xiaobing Hao"'
Publikováno v:
IEEE Access, Vol 7, Pp 79602-79616 (2019)
Complex functional integration leads to intricate logical control flows which in turn presents a great challenge to construct software behavior models. In this paper, we propose a probabilistic software behavior model by mining the execution traces u
Externí odkaz:
https://doaj.org/article/9ec4bbc5b4cf43c99958674e7a577678
Publikováno v:
International Conference on Intelligent Systems, Communications, and Computer Networks (ISCCN 2022).
Publikováno v:
Security and Communication Networks, Vol 2019 (2019)
Intrusion detection system (IDS) can effectively identify anomaly behaviors in the network; however, it still has low detection rate and high false alarm rate especially for anomalies with fewer records. In this paper, we propose an effective IDS by
Publikováno v:
Journal of Physics: Conference Series. 1453:012015
Given that analysis on the vulnerability of functions is helpful to the detection and improvement of software security, this paper aims to propose an efficient methods to identify the vulnerable nodes (ITVN) in different software by the interdependen
Publikováno v:
Security & Communication Networks; 3/7/2019, p1-11, 11p
Publikováno v:
Journal of Physics: Conference Series; 2020, Vol. 1453 Issue 1, p1-1, 1p