Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Zishuai Cheng"'
Publikováno v:
Applied Sciences, Vol 13, Iss 5, p 3244 (2023)
Anomaly detection has been proven to be an efficient way to detect malicious behaviour and cyberattacks in industrial cyber–physical systems (ICPSs). However, most detection models are not entirely adapted to the real world as they require intensiv
Externí odkaz:
https://doaj.org/article/57affa2872024d968ba1d5e6c0de2ffb
Publikováno v:
Security and Communication Networks. 2022:1-14
Secure data publishing of private trajectory is a typical application scene in the Internet of Things (IoT). Protecting users’ privacy while publishing data has always been a long-term challenge. In recent years, the mainstream method is to combine
Voice over LTE (VoLTE) and Voice over NR (VoNR), are two similar technologies that have been widely deployed by operators to provide a better calling experience in LTE and 5G networks, respectively. The VoLTE/NR protocols rely on the security feature
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c7fa9a5a948475e0f3b9e689629e0b74
http://arxiv.org/abs/2301.02487
http://arxiv.org/abs/2301.02487
Publikováno v:
Security and Communication Networks, Vol 2021 (2021)
Anomaly-based Web application firewalls (WAFs) are vital for providing early reactions to novel Web attacks. In recent years, various machine learning, deep learning, and transfer learning-based anomaly detection approaches have been developed to pro
Publikováno v:
Innovative Mobile and Internet Services in Ubiquitous Computing ISBN: 9783030503987
IMIS
IMIS
Traffic data distribution problem and novel network attack pose great threat to the traditional machine learning based anomaly network traffic detection system. In this paper, we design a method based on deep transfer learning to try to solve these p
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9f535bfe3e02d89bab37889fe11e2388
https://doi.org/10.1007/978-3-030-50399-4_37
https://doi.org/10.1007/978-3-030-50399-4_37
Publikováno v:
Communications in Computer and Information Science ISBN: 9789811590306
SocialSec
SocialSec
In recent years, various machine learning, deep learning based models have been developed to detect novel web attacks. These models are mostly use NLP methods, like N-gram, word-embedding, to process URLs as the general strings composed of characters
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5c6953ca5a844e9c61e84afa7978816e
https://doi.org/10.1007/978-981-15-9031-3_2
https://doi.org/10.1007/978-981-15-9031-3_2
Publikováno v:
Journal of Network and Computer Applications. 106:111-116
Payload-based anomaly detection can find out the malicious behavior hidden in network packets rather efficiently. It is quite suitable for securing web applications, which are used widely and a major concern of cyber security nowadays. Our research i
Publikováno v:
ICCSP
Attacks in the cyberspace is becoming more and more diverse and complex. Many attackers divide the payload in a TCP package into a set of IP packets. Though traditional attack detecting methods designed based on feature matching algorithm can only an
Publikováno v:
Innovative Mobile and Internet Services in Ubiquitous Computing ISBN: 9783319935539
IMIS
IMIS
The past decade has witnessed a rapidly developing Internet, which consequently brings about devastating web attacks of various types. The popularity of automated web attack tools also pushes the need for better methods to proactively detect the huge
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::efe0d0e35092f61bbc2d203ef715c8f8
https://doi.org/10.1007/978-3-319-93554-6_36
https://doi.org/10.1007/978-3-319-93554-6_36
Publikováno v:
AINA
In recent years, due to the rise of APT attacks and the failure of traditional security facilities, organizations have to collect a large amount of cyber-security-related data and try to unveil the previously unknown attacks by analyzing them. Additi