E-Books durchsuchen
Machine Learning for Cyber Security [2019]
- 1
-
Network Data Collection, Fusion, Mining and Analytics for Cyber Security
- 2
-
Malicious Web Request Detection Using Character-Level CNN
- 3
-
A LBP Texture Analysis Based Liveness Detection for Face Authentication
- 4
-
A Survey on Deep Learning Techniques for Privacy-Preserving
- 5
-
Quantifiable Network Security Measurement: A Study Based on an Index System
- 6
-
CatraDroid: A Call Trace Driven Detection of Malicious Behaiviors in Android Applications
- 7
-
Password Guessing via Neural Language Modeling
- 8
-
RETRACTED CHAPTER: A Cooperative Placement Method for Machine Learning Workflows and Meteorological Big Data Security Protection in Cloud Computing
- 9
-
A Lightweight Certificateless User Authentication Scheme for Mobile Environment
- 10
-
Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle System
- 11
-
SwipeVLock: A Supervised Unlocking Mechanism Based on Swipe Behavior on Smartphones
- 12
-
An Enumeration-Like Vector Sampling Method for Solving Approximate SVP
- 13
-
Secure Multiparty Learning from Aggregation of Locally Trained Models
- 14
-
Data-Driven Android Malware Intelligence: A Survey
- 15
-
Semantically Secure and Verifiable Multi-keyword Search in Cloud Computing
- 16
-
Content Recognition of Network Traffic Using Wavelet Transform and CNN
- 17
-
Compositional Information Flow Verification for Inter Application Communications in Android System
- 18
-
A Blackboard Sharing Mechanism for Community Cyber Threat Intelligence Based on Multi-Agent System
- 19
-
A Lightweight Secure IoT Surveillance Framework Based on DCT-DFRT Algorithms
- 20
-
Interpretable Encrypted Searchable Neural Networks
- 21
-
Game Theory Based Dynamic Defense Mechanism for SDN
- 22
-
A Visualization-Based Analysis on Classifying Android Malware
- 23
-
Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes
- 24
-
Reinforcement Learning Based UAV Trajectory and Power Control Against Jamming
- 25
-
A Fair and Efficient Secret Sharing Scheme Based on Cloud Assisting
- 26
-
Secure and Fast Decision Tree Evaluation on Outsourced Cloud Data
- 27
-
Who Activated My Voice Assistant? A Stealthy Attack on Android Phones Without Users’ Awareness