E-Books durchsuchen

Machine Learning for Cyber Security [2019]

1
Network Data Collection, Fusion, Mining and Analytics for Cyber Security
2
Malicious Web Request Detection Using Character-Level CNN
3
A LBP Texture Analysis Based Liveness Detection for Face Authentication
4
A Survey on Deep Learning Techniques for Privacy-Preserving
5
Quantifiable Network Security Measurement: A Study Based on an Index System
6
CatraDroid: A Call Trace Driven Detection of Malicious Behaiviors in Android Applications
7
Password Guessing via Neural Language Modeling
8
RETRACTED CHAPTER: A Cooperative Placement Method for Machine Learning Workflows and Meteorological Big Data Security Protection in Cloud Computing
9
A Lightweight Certificateless User Authentication Scheme for Mobile Environment
10
Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle System
11
SwipeVLock: A Supervised Unlocking Mechanism Based on Swipe Behavior on Smartphones
12
An Enumeration-Like Vector Sampling Method for Solving Approximate SVP
13
Secure Multiparty Learning from Aggregation of Locally Trained Models
14
Data-Driven Android Malware Intelligence: A Survey
15
Semantically Secure and Verifiable Multi-keyword Search in Cloud Computing
16
Content Recognition of Network Traffic Using Wavelet Transform and CNN
17
Compositional Information Flow Verification for Inter Application Communications in Android System
18
A Blackboard Sharing Mechanism for Community Cyber Threat Intelligence Based on Multi-Agent System
19
A Lightweight Secure IoT Surveillance Framework Based on DCT-DFRT Algorithms
20
Interpretable Encrypted Searchable Neural Networks
21
Game Theory Based Dynamic Defense Mechanism for SDN
22
A Visualization-Based Analysis on Classifying Android Malware
23
Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes
24
Reinforcement Learning Based UAV Trajectory and Power Control Against Jamming
25
A Fair and Efficient Secret Sharing Scheme Based on Cloud Assisting
26
Secure and Fast Decision Tree Evaluation on Outsourced Cloud Data
27
Who Activated My Voice Assistant? A Stealthy Attack on Android Phones Without Users’ Awareness
Feedback